Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/115758
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Electrical and Electronic Engineering | en_US |
| dc.contributor | Research Centre for Privacy and Security Technologies in Future Smart Systems | en_US |
| dc.creator | Xiao, Y | en_US |
| dc.creator | Hu, H | en_US |
| dc.creator | Ye, Q | en_US |
| dc.creator | Tang, L | en_US |
| dc.creator | Liang, Z | en_US |
| dc.creator | Zheng, H | en_US |
| dc.date.accessioned | 2025-10-28T02:00:41Z | - |
| dc.date.available | 2025-10-28T02:00:41Z | - |
| dc.identifier.issn | 1545-5971 | en_US |
| dc.identifier.uri | http://hdl.handle.net/10397/115758 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers | en_US |
| dc.rights | © 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | en_US |
| dc.rights | The following publication Y. Xiao, H. Hu, Q. Ye, L. Tang, Z. Liang and H. Zheng, "Unlocking High-Fidelity Learning: Towards Neuron-Grained Model Extraction," in IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 6, pp. 6622-6635, Nov.-Dec. 2025 is available at https://doi.org/10.1109/TDSC.2025.3588857. | en_US |
| dc.subject | Defense against model extraction | en_US |
| dc.subject | Machine learning privacy | en_US |
| dc.subject | Model extraction attack | en_US |
| dc.title | Unlocking high-fidelity learning : towards neuron-grained model extraction | en_US |
| dc.type | Journal/Magazine Article | en_US |
| dc.identifier.spage | 6622 | en_US |
| dc.identifier.epage | 6635 | en_US |
| dc.identifier.volume | 22 | en_US |
| dc.identifier.issue | 6 | en_US |
| dc.identifier.doi | 10.1109/TDSC.2025.3588857 | en_US |
| dcterms.abstract | Model extraction (ME) attacks replicate valuable black-box machine learning (ML) models via malicious query interactions. Cutting-edge attacks focus on actively designing query samples to enhance model fidelity and imprudently adhere to the standard ML training approach. This causes a deviation from the true objective of learning a model over a task. In this paper, we innovatively shift our focus from query selection to training process optimization, aiming to boost the similarity of the copy model with the victim model from neuron to model level. We leverage neuron matching theory to attain this objective and develop a general training booster framework, MEBooster, to fully exploit this theory. MEBooster comprises an initial bootstrapping phase that furnishes initial parameters and an optimal model architecture, followed by a post-processing phase that employs fine-tuning for enhanced neuron matching. Notably, MEBooster can seamlessly integrate with all existing model extraction attacks, enhancing their overall performance. Performance evaluation shows up to 58.10% fidelity gain in image classification. From a defender's perspective, we introduce a novel defensive strategy called Stochastic Norm Enlargement (SNE) to mitigate the risk of such attacks by enlarging the model parameters' norm property in training. Performance evaluation shows up to 58.81% extractability (i.e., fidelity) reduction. | en_US |
| dcterms.accessRights | open access | en_US |
| dcterms.bibliographicCitation | IEEE transactions on dependable and secure computing, Nov.-Dec. 2025, v. 22, no. 6, p. 6622-6635 | en_US |
| dcterms.isPartOf | IEEE transactions on dependable and secure computing | en_US |
| dcterms.issued | 2025-11 | - |
| dc.identifier.scopus | 2-s2.0-105010973289 | - |
| dc.identifier.eissn | 1941-0018 | en_US |
| dc.description.validate | 202510 bcch | en_US |
| dc.description.oa | Accepted Manuscript | en_US |
| dc.identifier.SubFormID | G000302/2025-08 | - |
| dc.description.fundingSource | RGC | en_US |
| dc.description.fundingSource | Others | en_US |
| dc.description.fundingText | This work was supported by the National Natural Science Foundation of China (Grant No: 92270123 and 62372122), the Research Grants Council, Hong Kong SAR, China (Grant No: 15226221, 15225921, and 15208923), and the Innovation and Technology Fund (Grant No: ITS-140-23FP). | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.description.oaCategory | Green (AAM) | en_US |
| Appears in Collections: | Journal/Magazine Article | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Xiao_Unlocking_High_Fidelity.pdf | Pre-Published version | 4.1 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



