no code implementations • 16 Jun 2022 • Daryna Oliynyk, Rudolf Mayer, Andreas Rauber
We address this by categorising and comparing model stealing attacks, assessing their performance, and exploring corresponding defence techniques in different settings.