{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2024,4,19]],“日期-时间”:“2024-04-19T06:31:31Z”,“时间戳”:1713508231156},“参考-计数”:17,“出版商”:“IEEE”,“许可证”:[{“开始”:{'日期-部件“:[2020,6,1]],”日期-时间“:”2020-06-01T00:00:00Z”,“timestamp”:1590969600000},“content-version”:“vor”,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/ieee.html”},{“start”:{“date-parts”:[[2020,6,1]],“date-time”:“2020-06-01T00:00:00Z”,“timestamp”:1590969600000},“content-version”:“stm-asf”,“delay-in-days“:0,”URL“https:\\/doi.org\/10.1 5223\/policy-029“},{“开始”:{“日期部分”:[[2020,6,1]],“date-time”:“2020-06-01T00:00:00Z”,“timestamp”:1590969600000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\\/doi.org\/10.15223\/policy-037”}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},”short-container-title“:[],”published-print“:{”date-parts“:[2020,6]},“doi”:“10.1109\/cns48642.20200.9162336”,“类型”:“procesdings-article”,“created”:{“date-parts”:[[2020,8,7]],“date-time”:“2020-08-07T21:54:40Z”,“timestamp”:1596837280000},“source”:“Crossref”,“is-referenced-by-count”:2,“title”:[“扰动输入以防止模型窃取”],“prefix”:“10.1109”,”author“:[{”given“Justin”,“family”:“Grana”,“sequence”:“first”,“affiliation”:[]}],“成员”:“263”,“reference”:[{“key”:“ref10”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ICLA.2015.152”},{“密钥”:“ref11”,“doi-assertd-by”:“publisher”,“DI:”10.1109\/THS.2017.943475“601”,“article-title”:“通过预测api窃取机器学习模型”,“author”:“tram\u00e8r”,“year”:“2016”,“journal-title”:“第25届USENIX安全研讨会(USENIX-Security 16)”},{“key”:“ref14”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/SP.2018.00038”}页面“:”355“,”文章标题“:“形式化模型转换攻击的方法论”,“author”:“xi”,“year”:“2016”,“journal-title”:“2016IEEE第29届计算机安全基础研讨会(CSF)CSF”},{“key”:“ref17”,“doi-asserted-by”:“publisher”,”doi“:”10.1007\/978-3-030-29959-0_4“},”{“key”:”ref4“,”article-title“:”神经网络模型的高精度提取“,”author“:“jagielski”,“年份”:“2019年”,“新闻标题”:“arXiv预印本arXiv 1909 01771”},{“key”:“ref3”,“article-title”:“具有深度工具变量网络的反事实预测”,“author”:“hartford”,“year”:“2016”,“journal-title“:”arXiv preprint arXiv 1612 09596“},”{“key”:“ref6”,“article-title”:“使用欺骗性扰动防御机器学习模型窃取攻击”,“author”:“lee”,“year”:“2018”,“journal-title”:“arXiv预印本arXiv 1806 00054”},{“key”:“ref5”,“article-title“:“Prada:protecting against from dnn model stelling attacking”,“author”:“juuti”,“年份”:“2018”,“日记标题”:“arXiv预印本arXiv1805 02628”}:“ref8”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/CVPR.2019.00509”},{“key”:“ref7”,“doi-assertd-by”:“publisher”,“DI:”10.1145\/1081870.1081950“}”,{”key“:”ref2“,”doi-assert-by“:”publisher“,”doi“:”10.1016\/0304-4076(86)90058-8“},{(key):”ref1“,”author“:”greene“,“年份”:“2003年”,“新闻标题”:“计量经济学分析”},{“关键字”:“ref9”,“doi-asserted-by”:“publisher”,“DOI”:“10.1145 \/3052973.3053009”}],“event”:{“name”:“2020 IEEE通信与网络安全会议(CNS)”,“location”:“Avignon,France”,“start”:{“date-parts”:[[2020,6,29]]},“end”:}“date-parts”:[2020,7,1]]}}:[{“URL”:“http:\/\/exploresting.ieee.org/ielx7\/9153729\/9916217\/0916236.pdf?arnumber=9162336”,“内容类型”:“未指定”,“内容版本”:“vor”,“预期应用程序”:“相似性检查”}],“存放”:{“日期部分”:[[2022,6,27]],“日期时间”:“2022-06-27T15:57:31Z”,“时间戳”:1656345451000},“分数”:1,“资源”:{“主要”:{“URL”:“https:\/\/ieeexplore.iee.org\/document\/9162336\/”}},“副标题”:[],“短标题”:[],“已发布”:{“日期-部件”:[[2020,6]]},”引用计数“:17,”URL“:”http://\/dx.doi.org\/10.109\/cns48642.2020.9162336“,”关系“:{},}}}