{"id":"https://openalex.org/W7134197460","doi":"https://doi.org/10.1186/s42400-025-00467-1","title":"Mgct: a multi-generator collaborative training approach for data-free model stealing","display_name":"Mgct: a multi-generator collaborative training approach for data-free model stealing","publication_year":2026,"publication_date":"2026-03-09","ids":{"openalex":"https://openalex.org/W7134197460","doi":"https://doi.org/10.1186/s42400-025-00467-1"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00467-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00467-1","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00467-1.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00467-1.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5128361325","display_name":"Yunlong Gao","orcid":null},"institutions":[{"id":"https://openalex.org/I167383011","display_name":"Henan University of Science and Technology","ror":"https://ror.org/05d80kz58","country_code":"CN","type":"education","lineage":["https://openalex.org/I167383011"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunlong Gao","raw_affiliation_strings":["Henan Intelligent Manufacturing Big Data Development Innovation Laboratory, Henan University of Science and Technology, Luoyang, 471023, China","Henan International Joint Laboratory of Cyberspace Security Applications, Henan University of Science and Technology, Luoyang, 471023, China","Information Engineering College, Henan University of Science and Technology, Luoyang, 471023, China"],"affiliations":[{"raw_affiliation_string":"Henan Intelligent Manufacturing Big Data Development Innovation Laboratory, Henan University of Science and Technology, Luoyang, 471023, China","institution_ids":["https://openalex.org/I167383011"]},{"raw_affiliation_string":"Henan International Joint Laboratory of Cyberspace Security Applications, Henan University of Science and Technology, Luoyang, 471023, China","institution_ids":["https://openalex.org/I167383011"]},{"raw_affiliation_string":"Information Engineering College, Henan University of Science and Technology, Luoyang, 471023, China","institution_ids":["https://openalex.org/I167383011"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128342942","display_name":"Zhiyong Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I167383011","display_name":"Henan University of Science and Technology","ror":"https://ror.org/05d80kz58","country_code":"CN","type":"education","lineage":["https://openalex.org/I167383011"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiyong Zhang","raw_affiliation_strings":["Henan Intelligent Manufacturing Big Data Development Innovation Laboratory, Henan University of Science and Technology, Luoyang, 471023, China","Henan International Joint Laboratory of Cyberspace Security Applications, Henan University of Science and Technology, Luoyang, 471023, China","Information Engineering College, Henan University of Science and Technology, Luoyang, 471023, China"],"affiliations":[{"raw_affiliation_string":"Henan Intelligent Manufacturing Big Data Development Innovation Laboratory, Henan University of Science and Technology, Luoyang, 471023, China","institution_ids":["https://openalex.org/I167383011"]},{"raw_affiliation_string":"Henan International Joint Laboratory of Cyberspace Security Applications, Henan University of Science and Technology, Luoyang, 471023, China","institution_ids":["https://openalex.org/I167383011"]},{"raw_affiliation_string":"Information Engineering College, Henan University of Science and Technology, Luoyang, 471023, China","institution_ids":["https://openalex.org/I167383011"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100733756","display_name":"Han Liang","orcid":"https://orcid.org/0000-0001-8493-6495"},"institutions":[{"id":"https://openalex.org/I167383011","display_name":"Henan University of Science and Technology","ror":"https://ror.org/05d80kz58","country_code":"CN","type":"education","lineage":["https://openalex.org/I167383011"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Han Liang","raw_affiliation_strings":["Henan Intelligent Manufacturing Big Data Development Innovation Laboratory, Henan University of Science and Technology, Luoyang, 471023, China","Henan International Joint Laboratory of Cyberspace Security Applications, Henan University of Science and Technology, Luoyang, 471023, China","Information Engineering College, Henan University of Science and Technology, Luoyang, 471023, China"],"affiliations":[{"raw_affiliation_string":"Henan Intelligent Manufacturing Big Data Development Innovation Laboratory, Henan University of Science and Technology, Luoyang, 471023, China","institution_ids":["https://openalex.org/I167383011"]},{"raw_affiliation_string":"Henan International Joint Laboratory of Cyberspace Security Applications, Henan University of Science and Technology, Luoyang, 471023, China","institution_ids":["https://openalex.org/I167383011"]},{"raw_affiliation_string":"Information Engineering College, Henan University of Science and Technology, Luoyang, 471023, China","institution_ids":["https://openalex.org/I167383011"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077957037","display_name":"Bin Song","orcid":"https://orcid.org/0000-0002-7269-2101"},"institutions":[{"id":"https://openalex.org/I167383011","display_name":"Henan University of Science and Technology","ror":"https://ror.org/05d80kz58","country_code":"CN","type":"education","lineage":["https://openalex.org/I167383011"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Song","raw_affiliation_strings":["Henan Intelligent Manufacturing Big Data Development Innovation Laboratory, Henan University of Science and Technology, Luoyang, 471023, China","Henan International Joint Laboratory of Cyberspace Security Applications, Henan University of Science and Technology, Luoyang, 471023, China","Information Engineering College, Henan University of Science and Technology, Luoyang, 471023, China"],"affiliations":[{"raw_affiliation_string":"Henan Intelligent Manufacturing Big Data Development Innovation Laboratory, Henan University of Science and Technology, Luoyang, 471023, China","institution_ids":["https://openalex.org/I167383011"]},{"raw_affiliation_string":"Henan International Joint Laboratory of Cyberspace Security Applications, Henan University of Science and Technology, Luoyang, 471023, China","institution_ids":["https://openalex.org/I167383011"]},{"raw_affiliation_string":"Information Engineering College, Henan University of Science and Technology, Luoyang, 471023, China","institution_ids":["https://openalex.org/I167383011"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5128342942"],"corresponding_institution_ids":["https://openalex.org/I167383011"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.78772289,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.3982999920845032,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.3982999920845032,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.07270000129938126,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.05649999901652336,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/replication","display_name":"Replication (statistics)","score":0.4948999881744385},{"id":"https://openalex.org/keywords/sampling","display_name":"Sampling (signal processing)","score":0.490200012922287},{"id":"https://openalex.org/keywords/generator","display_name":"Generator (circuit theory)","score":0.4555000066757202},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.41359999775886536},{"id":"https://openalex.org/keywords/adaboost","display_name":"AdaBoost","score":0.36809998750686646},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.3643999993801117},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.3603000044822693},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.35030001401901245},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.3481999933719635}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8004999756813049},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.4948999881744385},{"id":"https://openalex.org/C140779682","wikidata":"https://www.wikidata.org/wiki/Q210868","display_name":"Sampling (signal processing)","level":3,"score":0.490200012922287},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.4555000066757202},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42590001225471497},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.41359999775886536},{"id":"https://openalex.org/C141404830","wikidata":"https://www.wikidata.org/wiki/Q2823869","display_name":"AdaBoost","level":3,"score":0.36809998750686646},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.3643999993801117},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3628999888896942},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.3603000044822693},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.35030001401901245},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.3481999933719635},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.3447999954223633},{"id":"https://openalex.org/C2777211547","wikidata":"https://www.wikidata.org/wiki/Q17141490","display_name":"Training (meteorology)","level":2,"score":0.34220001101493835},{"id":"https://openalex.org/C2781395549","wikidata":"https://www.wikidata.org/wiki/Q4680762","display_name":"Adaptive sampling","level":3,"score":0.33869999647140503},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.33379998803138733},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.31470000743865967},{"id":"https://openalex.org/C121050878","wikidata":"https://www.wikidata.org/wiki/Q5135020","display_name":"Cloning (programming)","level":2,"score":0.3118000030517578},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.30799999833106995},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.2928999960422516},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.28769999742507935},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2870999872684479},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2734000086784363},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.27070000767707825},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.26840001344680786},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.25920000672340393},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2563000023365021}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00467-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00467-1","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00467-1.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:80237d078fc34f288652e5f1d4bdcfa6","is_oa":true,"landing_page_url":"https://doaj.org/article/80237d078fc34f288652e5f1d4bdcfa6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00467-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00467-1","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00467-1.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320336593","display_name":"Henan Provincial Science and Technology Research Project","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7134197460.pdf","grobid_xml":"https://content.openalex.org/works/W7134197460.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1534477342","https://openalex.org/W2112796928","https://openalex.org/W2194775991","https://openalex.org/W2294710185","https://openalex.org/W2618530766","https://openalex.org/W2963303354","https://openalex.org/W2996834813","https://openalex.org/W3034957837","https://openalex.org/W3087685156","https://openalex.org/W3121523901","https://openalex.org/W3168149265","https://openalex.org/W3174136778","https://openalex.org/W3178659068","https://openalex.org/W3189360412","https://openalex.org/W4312343407","https://openalex.org/W4313010394","https://openalex.org/W4367368092","https://openalex.org/W4379983599","https://openalex.org/W4382317858","https://openalex.org/W4383221380","https://openalex.org/W4385519424","https://openalex.org/W4386214368","https://openalex.org/W4394597237","https://openalex.org/W4394620074","https://openalex.org/W4401039805","https://openalex.org/W4402727543","https://openalex.org/W4402981667"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Model":[1,81],"stealing":[2,40],"attacks":[3],"in":[4,18,150,242],"the":[5,63,101,105,120,127,151,177,181,194,212,217,236,239,244],"Machine":[6],"Learning":[7],"as":[8,46],"a":[9,74,92,108,131,135,156],"Service":[10],"(MLaaS)":[11],"paradigm":[12,95],"face":[13,42],"multiple":[14],"technical":[15,87,245],"challenges,":[16],"particularly":[17],"scenarios":[19],"lacking":[20],"training":[21,182],"data":[22,210],"support.":[23],"Target":[24],"models":[25],"remain":[26],"vulnerable":[27],"to":[28,84,96,185],"reverse":[29],"engineering":[30],"and":[31,54,125,160,168,205,225],"replication":[32],"under":[33,229],"strict":[34],"environmental":[35],"constraints.":[36],"Existing":[37],"data-free":[38,248],"model":[39,139,249],"methods":[41],"critical":[43],"issues":[44],"such":[45,67],"excessively":[47],"high":[48],"query":[49,206],"costs,":[50],"limited":[51],"attack":[52],"accuracy,":[53],"low":[55],"sample":[56],"utilization":[57],"efficiency.":[58,207],"These":[59,232],"factors":[60],"significantly":[61,175,197],"undermine":[62],"practical":[64],"feasibility":[65],"of":[66,100,122,130,180,238,247],"attacks.":[68],"In":[69,104],"this":[70],"work,":[71],"we":[72],"design":[73],"Multi-Generator":[75],"Collaborative":[76],"Training":[77],"Approach":[78],"for":[79,114],"Data-Free":[80],"Stealing":[82],"(MGCT)":[83],"address":[85],"these":[86],"bottlenecks.":[88],"This":[89],"framework":[90,196,219],"employs":[91],"two-phase":[93],"optimization":[94,128],"achieve":[97],"effective":[98],"extraction":[99],"target":[102],"model:":[103],"first":[106],"phase,":[107],"parallelized":[109],"generator":[110,133],"architecture":[111],"is":[112,148,172],"utilized":[113],"multi-generator":[115],"collaborative":[116],"training,":[117],"which":[118],"enhances":[119],"diversity":[121],"synthetic":[123],"samples":[124,164],"alleviates":[126],"difficulty":[129],"single":[132],"through":[134],"load-balancing":[136],"strategy.":[137],"A":[138],"distillation":[140],"mechanism":[141],"based":[142],"on":[143,211],"an":[144],"enhanced":[145],"experience":[146],"replay":[147],"designed":[149],"second":[152],"phase.":[153],"By":[154],"integrating":[155],"hybrid":[157],"sampling":[158],"strategy":[159],"class-balancing":[161],"constraints,":[162],"low-confidence":[163],"are":[165],"dynamically":[166],"selected,":[167],"class":[169],"distribution":[170],"equilibrium":[171],"maintained,":[173],"thereby":[174],"improving":[176],"representational":[178],"capacity":[179],"data.":[183],"Compared":[184],"existing":[186],"baseline":[187],"methods,":[188],"experimental":[189,209,233],"evaluation":[190,200],"results":[191,234],"demonstrate":[192,235],"that":[193,216],"MGCT":[195,218],"improves":[198,220],"core":[199],"metrics,":[201],"including":[202],"clone":[203],"accuracy":[204,222],"Specifically,":[208],"CIFAR-100":[213],"dataset":[214],"show":[215],"cloning":[221],"by":[223],"2.07%":[224],"achieves":[226],"14.14%":[227],"improvement":[228],"constrained":[230],"budgets.":[231],"efficacy":[237],"proposed":[240],"method":[241],"addressing":[243],"bottlenecks":[246],"stealing.":[250]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2026-03-09T00:00:00"}
