바로가기 메뉴 본문 바로가기 주메뉴 바로가기
  • 09-1Do you have a defense technique in place against model extraction attacks?
    • A model extraction attack involves organizing a substitute model with similar performance as the trained model being serviced. The attack takes place by analyzing prediction on various inputs of the trained model and extracting classification criteria. The extracted data include the trained model’s input data, hyperparameter information, and hierarchical structure. Applicable countermeasures against such attacks to mitigate this would be limiting the number of queries and obfuscating predictions.