{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:36:05Z","timestamp":1772908565796,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1109\/tps-isa67132.2025.00024","type":"proceedings-article","created":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:50:15Z","timestamp":1772571015000},"page":"140-147","source":"Crossref","is-referenced-by-count":1,"title":["Clone What You Can't Steal: Black-Box LLM Replication via Logit Leakage and Distillation"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0032-8201","authenticated-orcid":false,"given":"Kanchon","family":"Gharami","sequence":"first","affiliation":[{"name":"Embry-Riddle Aeronautical University,Department of Electrical Engineering and Computer Science,FL,USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8748-761X","authenticated-orcid":false,"given":"Hansaka","family":"Aluvihare","sequence":"additional","affiliation":[{"name":"Embry-Riddle Aeronautical University,Department of Mathematics,FL,USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7710-4217","authenticated-orcid":false,"given":"Shafika Showkat","family":"Moni","sequence":"additional","affiliation":[{"name":"Embry-Riddle Aeronautical University,Department of Electrical Engineering and Computer Science,FL,USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7572-3663","authenticated-orcid":false,"given":"Berker","family":"Pek\u00f6z","sequence":"additional","affiliation":[{"name":"Embry-Riddle Aeronautical University,Department of Electrical Engineering and Computer Science,FL,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Fine-tuning and evaluating open-source large language models for the army domain","author":"Ruiz","year":"2024","journal-title":"arXiv preprint"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3522103"},{"key":"ref3","article-title":"Fine-tuned language models as space systems controllers","author":"Zucchelli","year":"2025","journal-title":"arXiv preprint"},{"key":"ref4","article-title":"Milchat: Introducing chain of thought reasoning and grpo to a multimodal small language model for remote sensing","author":"Koksal","year":"2025","journal-title":"arXiv preprint"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103645"},{"key":"ref6","first-page":"5680","article-title":"Stealing part of a production language model","volume-title":"Proceedings of the 41st International Conference on Machine Learning","author":"Carlini","year":"2024"},{"key":"ref7","article-title":"Teach 11 ms to phish: Stealing private information from language models","volume-title":"The Twelfth International Conference on Learning Representations","author":"Panda","year":"2024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3717823.3718220"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3595292"},{"key":"ref10","first-page":"13326","article-title":"Privacy backdoors: stealing data with corrupted pretrained models","volume-title":"Proceedings of the 41st International Conference on Machine Learning","author":"Feng","year":"2024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01571"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2024.3489427"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA62245.2024.00053"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA62245.2024.00036"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13142858"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.52202\/079017-0731"},{"key":"ref17","article-title":"Multi-turn context jailbreak attack on large language models from first principles","author":"Sun","year":"2024","journal-title":"arXiv preprint"},{"key":"ref18","article-title":"Harmbench: A standardized evaluation framework for automated red teaming and robust refusal","author":"Mazeika","year":"2024","journal-title":"ICML"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4140\/TCP.n.2015.249"},{"key":"ref20","volume-title":"Wikitext-2 data","author":"Mettu","year":"2025"},{"key":"ref21","volume-title":"Wikitext103","author":"D","year":"2025"},{"key":"ref22","article-title":"Scalable extraction of training data from (production) language models","author":"Nasr","year":"2023","journal-title":"arXiv preprint"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/03610926.2024.2352016"}],"event":{"name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","location":"Pittsburgh, PA, USA","start":{"date-parts":[[2025,11,12]]},"end":{"date-parts":[[2025,11,14]]}},"container-title":["2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11410113\/11410157\/11410244.pdf?arnumber=11410244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T07:06:13Z","timestamp":1772607973000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11410244\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/tps-isa67132.2025.00024","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]}}}