MEGA: Model Stealing via Collaborative Generator-Substitute Networks. Hong, C., Huang, J., & Chen, L. Y. CoRR, 2022.
Paper bibtex @article{DBLP:journals/corr/abs-2202-00008,
author = {Chi Hong and
Jiyue Huang and
Lydia Y. Chen},
title = {{MEGA:} Model Stealing via Collaborative Generator-Substitute Networks},
journal = {CoRR},
volume = {abs/2202.00008},
year = {2022},
url = {https://arxiv.org/abs/2202.00008},
eprinttype = {arXiv},
eprint = {2202.00008},
timestamp = {Wed, 09 Feb 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2202-00008.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"ofYW6BL3MHZ6oEs4C","bibbaseid":"hong-huang-chen-megamodelstealingviacollaborativegeneratorsubstitutenetworks-2022","author_short":["Hong, C.","Huang, J.","Chen, L. Y."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Chi"],"propositions":[],"lastnames":["Hong"],"suffixes":[]},{"firstnames":["Jiyue"],"propositions":[],"lastnames":["Huang"],"suffixes":[]},{"firstnames":["Lydia","Y."],"propositions":[],"lastnames":["Chen"],"suffixes":[]}],"title":"MEGA: Model Stealing via Collaborative Generator-Substitute Networks","journal":"CoRR","volume":"abs/2202.00008","year":"2022","url":"https://arxiv.org/abs/2202.00008","eprinttype":"arXiv","eprint":"2202.00008","timestamp":"Wed, 09 Feb 2022 00:00:00 +0100","biburl":"https://dblp.org/rec/journals/corr/abs-2202-00008.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/corr/abs-2202-00008,\n author = {Chi Hong and\n Jiyue Huang and\n Lydia Y. Chen},\n title = {{MEGA:} Model Stealing via Collaborative Generator-Substitute Networks},\n journal = {CoRR},\n volume = {abs/2202.00008},\n year = {2022},\n url = {https://arxiv.org/abs/2202.00008},\n eprinttype = {arXiv},\n eprint = {2202.00008},\n timestamp = {Wed, 09 Feb 2022 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/corr/abs-2202-00008.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Hong, C.","Huang, J.","Chen, L. Y."],"key":"DBLP:journals/corr/abs-2202-00008","id":"DBLP:journals/corr/abs-2202-00008","bibbaseid":"hong-huang-chen-megamodelstealingviacollaborativegeneratorsubstitutenetworks-2022","role":"author","urls":{"Paper":"https://arxiv.org/abs/2202.00008"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/93/2896.bib","dataSources":["NQFDDe68trkhFBZaC"],"keywords":[],"search_terms":["mega","model","stealing","via","collaborative","generator","substitute","networks","hong","huang","chen"],"title":"MEGA: Model Stealing via Collaborative Generator-Substitute Networks","year":2022}