Determine applicability: Consider this question if expedients such as damage to human life and property, infringement of equity, and being selected as a welfare recipient are expected when developing and implementing text or speech data-based AI services in the public sector, and determine if the requirement has been satisfied.
• A model extraction attack is an attack to extract the classification criteria in which an adversary analyzes various inputs of the trained model and trains a substitute model with similar functions. The attack involves creating hostile data for evasion attacks or analyzing the outputs for a secondary attack, i.e. a model evasion attack.
• Limiting the number of queries and obfuscating predictions are some of the methods to mitigate or block extraction attacks to image recognition and processing for public services and text or speech recognition AI services.