{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T09:31:16Z","timestamp":1775899876971,"version":"3.50.1"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,6]]},"DOI":"10.1109\/icassp49660.2025.10887780","type":"proceedings-article","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:52:43Z","timestamp":1741787563000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Efficient and Effective Model Extraction"],"prefix":"10.1109","author":[{"given":"Hongyu","family":"Zhu","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering,China"}]},{"given":"Wentao","family":"Hu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering,China"}]},{"given":"Sichu","family":"Liang","sequence":"additional","affiliation":[{"name":"Southeast University,School of Artificial Intelligence,China"}]},{"given":"Fangqi","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering,China"}]},{"given":"Wenwen","family":"Wang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University,USA"}]},{"given":"Shilin","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering,China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"AI Services","year":"2016"},{"key":"ref2","article-title":"Vision API","year":"2016"},{"key":"ref3","article-title":"Whisper","year":"2022"},{"key":"ref4","article-title":"Codex","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3595292"},{"key":"ref6","article-title":"SoK: All You Need to Know About On-Device ML Model Extraction-The Gap Between Research and Practice","volume-title":"Proceedings of the 33rd USENIX Security Symposium","author":"Nayan"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623325"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575738"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00509"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00474"},{"key":"ref12","article-title":"IDEAL: Query-efficient data-free learning from black-box models","volume-title":"ICLR","author":"Zhang"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24178"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02295"},{"key":"ref15","article-title":"Marich: A Query-Efficient Distributionally Equivalent Model Extraction Attack using Public Data","volume-title":"Proceedings of the Advances in Neural Information Processing Systems","author":"Karmakar"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10447550"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3251842"},{"key":"ref18","article-title":"High accuracy and high fidelity extraction of neural networks","volume-title":"Proceedings of the 29th USENIX Security Symposium","author":"Jagielski"},{"key":"ref19","article-title":"Beyond Labeling Oracles - What does it mean to steal ML models?","volume-title":"Transactions on Machine Learning Research","author":"Shafran","year":"2024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681610"},{"key":"ref21","article-title":"Distilling the Knowledge in a Neural Network","volume-title":"Proceedings of the NIPS Workshop","author":"Hinton"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/327"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01360"},{"key":"ref24","article-title":"Generative Adversarial Nets","volume-title":"Proceedings of the NIPS Conference","author":"Goodfellow"},{"key":"ref25","article-title":"Intriguing properties of neural networks","volume-title":"ICLR","author":"Szegedy"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3472291"},{"key":"ref27","article-title":"Exploring Connections Between Active Learning and Model Extraction","volume-title":"Proceedings of the USENIX Security Symposium","author":"Chandrasekaran"},{"key":"ref28","article-title":"Positive-Unlabeled Compression on the Cloud","volume-title":"Proceedings of the Advances in Neural Information Processing Systems","author":"Xu"},{"key":"ref29","article-title":"Outsourcing Training without Uploading Data via Efficient Collaborative Open-Source Sampling","volume-title":"Annual Conference on Neural Information Processing Systems","author":"Hong"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4324\/9781410605337-29"},{"key":"ref31","article-title":"Pytorch: An imperative style, high-performance deep learning library","author":"Paszke","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref32","article-title":"On calibration of modern neural networks","volume-title":"International conference on machine learning","author":"Guo"},{"key":"ref33","article-title":"Does knowledge distillation really work?","author":"Stanton","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/362"},{"key":"ref35","volume-title":"Deep learning","author":"Bengio","year":"2017"},{"key":"ref36","article-title":"Geometric Dataset Distances via Optimal Transport","author":"Alvarez-Melis","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00636"},{"key":"ref38","article-title":"Improving robustness against common corruptions by covariate shift adaptation","author":"Schneider","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01602"},{"key":"ref40","article-title":"Test-Time Classifier Adjustment Module for Model-Agnostic Domain Generalization","author":"Iwasawa","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.5555\/3294996.3295163"},{"key":"ref42","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01511"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3657002"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10446501"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/icassp49660.2025.10888549"}],"event":{"name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Hyderabad, India","start":{"date-parts":[[2025,4,6]]},"end":{"date-parts":[[2025,4,11]]}},"container-title":["ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10887540\/10887541\/10887780.pdf?arnumber=10887780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:23:22Z","timestamp":1774416202000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10887780\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,6]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/icassp49660.2025.10887780","relation":{},"subject":[],"published":{"date-parts":[[2025,4,6]]}}}