{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2026,1,30]],“日期-时间”:“2026-01-30T00:10:38Z”,“时间戳”:1769731838063,“版本”:”3.49.0“},“引用-计数”:17,“发布者”:“IEEE”,“许可证”:[{“开始”:{-“日期-零件”:[2020,6,1]],”日期-时间“:”202 0-06-01T00:00:00Z“,”时间戳“:1590969600000},“content-version”:“vor”,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/IEE.html”},{“start”:{“date-parts”:[[2020,6,1]],“date-time”:“2020-06-01T00:00:00Z”,“timestamp”:1590969600000},“content-version”:“stm-asf”,“delay-in-days”:“0,”URL“https”:\/\/doi.org\/10.15223\/policy-029“},{”开始“:{“date-parts”:[[2020,6,1]],“date-time”:“2020-06-01T00:00:00Z”,“timestamp”:1590969600000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-037”}],“content-domain”:{”domain“:[],“crossmark-restriction”:false},”short-container-tile“:[],”published-print“:{“日期部分”:[[2020,6]]},“doi”:“10.1109\/cns48642.20200.9162336”,“type”:“procesdings-article”,“created”:{“date-parts”:[[2020,8,7]],“date-time”:“2020-08-07T17:54:40Z”,“timestamp”:1596822880000},“page”:”1-9“,“source”::“Justin”,“family”:“Grana”,“sequence”:“first”,“affiliation”:[]}],“member”:“263”,“reference”:[{“key”:“ref10”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/IMLA.2015.152”},{“密钥”:“ref11”,“doi-assertd-by”:“publisher”,“DI:”10.1109\/THS.2017.7943475:“10.1109\/SP.2017.41”},{“key”:“ref13”,“first-page”:“601”,“article-title”:“通过预测api窃取机器学习模型”,“author”:“tram\u00e8r”,“year”:“2016”,“journal-title”:“25th USENIX Security Symposium(USENIX-Security 16)”},{“key”:“ref14”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/SP.2018.00038”}{“键”:“参考16”,“first page”:“355”,“article-title”:“一种形式化模型入侵攻击的方法”,“author”:“xi”,“year”:“2016”,“journal-title“:”2016 IEEE 29届计算机安全基础研讨会(CSF)CSF“},{“key”:”ref17“,”doi-asserted-by“:”publisher“,”doi“:”10.1007\/978-3030-29959-0_4“}:“神经网络模型的高精度提取”,“author”:“jagielski”,“year”:“2019”,“journal-title”:“arXiv预印本arXiv 1909 01771”},{“key”:“ref3”,“article-title“:“deep instrumental variables networks的反事实预测”,“article-title”:“使用欺骗性扰动防御机器学习模型窃取攻击”,“author”:“lee”,“year”:“2018”,“journal-title“:“arXiv预印本arXiv 1806 00054”},{“key”:“ref5”,“artice-title(文章)”:“Prada:防御dnn模型窃取袭击”,“author”:“juuti”,“年份”:“2018”,“journal-ttitle”:“arXiv-print arXiv1805 02628”},{“key”:“ref8”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/CVPR.2019.00509”}“},{”key“:”ref1“,”author“:”greene“,”year“:”2003“,”journal-title“:“计量经济学分析”},{“key”:“ref9”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3052973.3053009”}],“event”:{“name”:“2020 IEEE通信与网络安全会议(CNS)”,“location”:“Avignon,France”,“start”:{“date-parts”:[2020,6,29]]},“end”:{date-part“[2020,1]]}},”container-title“:[“2020 IEEE通信与网络安全会议(CNS)”],“原始标题”:[],“链接”:[{“URL”:“http://\/xplorestaging.IEEE.org\/ielx7\/9153729\/9162157\/09162336.pdf?arnumber=9162336”,“内容类型”:“未指定”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“存放”:{“日期段”:[2022,6,27]],“日期时间”:“2022-06-27T11:57:31Z”,“timestamp”:1656331051000},“score”:1,“resource”:{“primary”:{“URL”:“https:\/\/ieexplore.iee.org\/document\/9162336\/”}},”subtitle“:[],”shorttitle“:[],”issued“:{”date-parts“:[2020,6]]},'references-count“:17,”URL“:”https:\//\/doi.org\/10.109\/cns4 8642.2020.9162336“,”关系“:{},”主题“:[],”发布“:{”日期部分“:[[2020,6]]}}}