{"id":"https://openalex.org/W3132928149","doi":"https://doi.org/10.1109/trustcom50675.2020.00273","title":"Special-Purpose Model Extraction Attacks: Stealing Coarse Model with Fewer Queries","display_name":"Special-Purpose Model Extraction Attacks: Stealing Coarse Model with Fewer Queries","publication_year":2020,"publication_date":"2020-12-01","ids":{"openalex":"https://openalex.org/W3132928149","doi":"https://doi.org/10.1109/trustcom50675.2020.00273","mag":"3132928149"},"language":"en","primary_location":{"id":"doi:10.1109/trustcom50675.2020.00273","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom50675.2020.00273","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084184185","display_name":"Rina Okada","orcid":"https://orcid.org/0009-0004-1082-1838"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Rina Okada","raw_affiliation_strings":["NTT Secure Platform Laboratories, Japan","NTT Secure Platform Laboratories, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories, Japan","institution_ids":["https://openalex.org/I2251713219"]},{"raw_affiliation_string":"NTT Secure Platform Laboratories, Tokyo, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066379540","display_name":"Zen Ishikura","orcid":null},"institutions":[{"id":"https://openalex.org/I4210106580","display_name":"NTT WEST Osaka Hospital","ror":"https://ror.org/01bfp5e25","country_code":"JP","type":"healthcare","lineage":["https://openalex.org/I4210106580"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Zen Ishikura","raw_affiliation_strings":["NTT West Corp. Osaka, Japan","NTT West Corp., Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"NTT West Corp. Osaka, Japan","institution_ids":["https://openalex.org/I4210106580"]},{"raw_affiliation_string":"NTT West Corp., Osaka, Japan","institution_ids":["https://openalex.org/I4210106580"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027436126","display_name":"Toshiki Shibahara","orcid":"https://orcid.org/0000-0002-2192-4355"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Toshiki Shibahara","raw_affiliation_strings":["NTT Secure Platform Laboratories, Japan","NTT Secure Platform Laboratories, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories, Japan","institution_ids":["https://openalex.org/I2251713219"]},{"raw_affiliation_string":"NTT Secure Platform Laboratories, Tokyo, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101103927","display_name":"Hasegawa Satoshi","orcid":null},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Satoshi Hasegawa","raw_affiliation_strings":["NTT Secure Platform Laboratories, Japan","NTT Secure Platform Laboratories, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories, Japan","institution_ids":["https://openalex.org/I2251713219"]},{"raw_affiliation_string":"NTT Secure Platform Laboratories, Tokyo, Japan","institution_ids":["https://openalex.org/I2251713219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5084184185"],"corresponding_institution_ids":["https://openalex.org/I2251713219"],"apc_list":null,"apc_paid":null,"fwci":0.1326,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58211023,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1995","last_page":"2000"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8515534400939941},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5279892086982727},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.5088644027709961},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.47929495573043823},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.42812877893447876},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32949668169021606},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.30981624126434326}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8515534400939941},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5279892086982727},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.5088644027709961},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.47929495573043823},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.42812877893447876},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32949668169021606},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.30981624126434326},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/trustcom50675.2020.00273","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom50675.2020.00273","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Zero hunger","score":0.699999988079071,"id":"https://metadata.un.org/sdg/2"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1945616565","https://openalex.org/W2034368206","https://openalex.org/W2194775991","https://openalex.org/W2461943168","https://openalex.org/W2603766943","https://openalex.org/W2789304371","https://openalex.org/W2805104469","https://openalex.org/W2879765882","https://openalex.org/W2904814116","https://openalex.org/W2963207607","https://openalex.org/W2963844355","https://openalex.org/W2964121744","https://openalex.org/W2964318098","https://openalex.org/W2969695741","https://openalex.org/W3118608800","https://openalex.org/W6751219861","https://openalex.org/W6752949846"],"related_works":["https://openalex.org/W4255837520","https://openalex.org/W2387011115","https://openalex.org/W3186372549","https://openalex.org/W4322731571","https://openalex.org/W3190778120","https://openalex.org/W1929087753","https://openalex.org/W4400055136","https://openalex.org/W2886023993","https://openalex.org/W3185781018","https://openalex.org/W2113607124"],"abstract_inverted_index":{"Model":[0],"extraction":[1],"(ME)":[2],"attacks":[3,143,182],"have":[4,48],"been":[5],"shown":[6],"to":[7,28,72,126],"cause":[8],"financial":[9],"losses":[10],"for":[11,113],"Machine-Learning-as-a-Service":[12],"(MLaaS)":[13],"providers.":[14],"Attackers":[15],"steal":[16,145],"ML":[17,35],"models":[18,25,36,54,80,89,101],"on":[19],"MLaaS":[20,32],"platforms":[21],"by":[22,38],"building":[23],"substitute":[24,53],"using":[26],"queries":[27,170],"and":[29,117,188],"responses":[30],"from":[31,96,130],"platforms.":[33],"The":[34],"targeted":[37,42,63],"attackers":[39,51,85,153],"are":[40],"called":[41],"models.":[43,82,103,147],"In":[44,83,133],"previous":[45],"studies,":[46],"researchers":[47],"assumed":[49],"that":[50,55,108,120,144,152],"build":[52,155],"classify":[56,66],"the":[57,172,177,181,191],"same":[58],"number":[59],"of":[60,70,140,193],"classes":[61,71,95],"as":[62,166,168],"ones,":[64],"which":[65,160],"thousands":[67],"or":[68],"millions":[69],"meet":[73],"users'":[74],"diverse":[75],"expectations.":[76],"We":[77,98,175],"call":[78,99],"such":[79,100],"general-purpose":[81],"fact,":[84],"can":[86,154],"monetize":[87],"stolen":[88],"if":[90],"they":[91],"accurately":[92],"distinguish":[93],"some":[94],"others.":[97],"special-purpose":[102,141,146,158],"For":[104],"instance,":[105],"a":[106,118,138,194],"model":[107,119],"detects":[109,121],"vehicles":[110],"is":[111,124],"useful":[112,125],"collision":[114],"avoidance":[115],"systems,":[116],"wild":[122],"animals":[123],"drive":[127],"them":[128],"away":[129],"agricultural":[131],"land.":[132],"this":[134],"work,":[135],"we":[136],"investigate":[137],"threat":[139],"ME":[142],"Our":[148],"experimental":[149],"results":[150],"show":[151],"an":[156,162],"accurate":[157],"model,":[159],"achieves":[161],"80%":[163],"f-measure,":[164],"with":[165,183],"few":[167],"100":[169],"in":[171,179],"worst":[173],"case.":[174],"discuss":[176],"difficulty":[178],"preventing":[180],"previously":[184],"proposed":[185],"defense":[186,196],"methods":[187],"point":[189],"out":[190],"necessity":[192],"new":[195],"method.":[197]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
