Knowledge Network Node

Research and Implementation of Model Stealing Attack Defense Technology for Deep Learning

张少康

北京邮电大学

Abstract: With the breakthrough progress of artificial intelligence technology,various applications based on neural networks have flourished and applied to multiple fields,such as autonomous driving,image recognition,and voice services.Training a model with good performance requires a lot of resources,so a well-trained model is a very valuable asset.Model stealing attacks allow attackers to access the model,thereby stealing the parameters and structure of the model,or training an alternative model with si... More
  • Series:

    (I) Electronic Technology & Information Science

  • Subject:

    Computer Software and Application of Computer; Automation Technology

  • DOI:

    10.26969/d.cnki.gbydu.2024.001199

  • Classification Code:

    TP18;TP391.41

Tutor:

徐国胜;

Retraction:

网络空间安全

QRcode

Download the mobile appuse the app to scan this coderead the article.

Tips: Please download CAJViewer to view CAJ format full text.

Download: 177 Page: 68 Size: 5467k

Related Literature
  • Similar Article
  • Reader Recommendationr
  • Citation Network
  • Study Results