Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks

Add code
Jun 26, 2019
Figure 1 for Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks
Figure 2 for Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks
Figure 3 for Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks
Figure 4 for Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: