scispace - formally typeset
Patent

Stolen machine learning model identification

TLDR
In this paper, the authors propose a method to assign a machine learning model signature to a model using data points and corresponding data labels from training data, and classify the model as a stolen classifier based on a predetermined threshold.
Abstract
One embodiment provides a method, including: assigning a machine learning model signature to a machine learning model, wherein the machine learning model signature is generated using (i) data points and (ii) corresponding data labels from training data; receiving input comprising identification of a target machine learning model; acquiring a target signature for the target machine learning model by generating a signature for the target machine learning model using (i) data points from the assigned machine learning model signature and (ii) labels assigned to those data points by the target machine learning model; determining a stolen score by comparing the target signature to the machine learning model signature and identifying the number of data labels that match between the target signature and the machine learning model signature; and classifying the target machine learning model as stolen based upon the stolen score reaching a predetermined threshold.

read more

Citations
More filters
Patent

Building security analysis system with site-independent signature generation for predictive security analysis

TL;DR: In this paper, the authors present a network-based centralized security monitoring (CSM) system, which includes one or more memory devices configured to store instructions thereon that, when executed by one or multiple processors, cause the processors to receive a plurality of parameter data elements.
References
More filters
Proceedings ArticleDOI

Membership Inference Attacks Against Machine Learning Models

TL;DR: This work quantitatively investigates how machine learning models leak information about the individual data records on which they were trained and empirically evaluates the inference techniques on classification models trained by commercial "machine learning as a service" providers such as Google and Amazon.
Patent

Methods, Systems, and Products for Identity Verification

TL;DR: In this article, a signature, representing the presence of a device, is acquired and compared to a reference signature, when the signature favorably compares to the reference signature; then the identity of a user associated with the device is verified.
Patent

Learning systems and methods

TL;DR: In this article, a sequence of images depicting an object is captured, e.g., by a camera at a point-of-sale terminal in a retail store, and the object is identified, such as by a barcode or watermark that is detected from one or more of the images.
Patent

Machine learning classifier

TL;DR: A machine learning classifier system includes a data set processing subsystem to generate a training set and a validation set from multiple data sources as mentioned in this paper, which is used to train a classifier and test the classifier according to the validation set.
Patent

Methods and systems for using an expectation-maximization (em) machine learning framework for behavior-based analysis of device behaviors

TL;DR: In this paper, a behavior-based monitoring and analysis system (or behaviour-based security system) of the computing device is used to better identify and respond to various conditions or behaviors that may have a negative impact on its performance, power utilization levels, network usage levels, security and/or privacy over time.
Trending Questions (1)
How to identify machine learning model weaknesses by intentionally fooling them?

The provided information does not mention anything about intentionally fooling machine learning models to identify weaknesses.