{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T19:29:32Z","timestamp":1771788572908,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NRF Investigatorship Programme","award":["NRF-NRFI05-2019-0002"],"award-info":[{"award-number":["NRF-NRFI05-2019-0002"]}]},{"name":"Alibaba Innovative Research (AIR) Program and Alibaba-NTU Singapore Joint Research Institute (JRI)"},{"name":"Wallenberg-NTU Presidential Postdoctoral Fellowship"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,21]]},"DOI":"10.1145\/3531146.3533188","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T14:27:10Z","timestamp":1655735230000},"page":"1318-1329","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["DualCF: Efficient Model Extraction Attack from Counterfactual Explanations"],"prefix":"10.1145","author":[{"given":"Yongjie","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Singapore"}]},{"given":"Hangwei","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Singapore"}]},{"given":"Chunyan","family":"Miao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2022,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Give Me Some Credit Dataset. https:\/\/www.kaggle.com\/c\/GiveMeSomeCredit\/overview"},{"key":"e_1_3_2_1_2_1","unstructured":"IBM AI\u00a0Explainability 360. [n. d.]. Credit Approval. https:\/\/nbviewer.org\/github\/IBM\/AIX360\/blob\/master\/examples\/tutorials\/HELOC.ipynb"},{"key":"e_1_3_2_1_3_1","unstructured":"Ulrich A\u00efvodji Alexandre Bolot and S\u00e9bastien Gambs. 2020. Model extraction from counterfactual explanations. arXiv preprint arXiv:2009.01884(2020)."},{"key":"e_1_3_2_1_4_1","unstructured":"SeldonIO alibi. [n. d.]. Counterfactuals guided by prototypes on Boston housing dataset. https:\/\/docs.seldon.io\/projects\/alibi\/en\/latest\/examples\/cfproto_housing.html"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372830"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Luyang Chen Markus Pelger and Jason Zhu. 2020. Deep learning in asset pricing. Available at SSRN 3350138(2020).","DOI":"10.2139\/ssrn.3600206"},{"key":"e_1_3_2_1_7_1","volume-title":"Improving generalization with active learning. Machine learning 15, 2","author":"Cohn David","year":"1994","unstructured":"David Cohn, Les Atlas, and Richard Ladner. 1994. Improving generalization with active learning. Machine learning 15, 2 (1994), 201\u2013221."},{"key":"e_1_3_2_1_8_1","unstructured":"FICO Community. [n. d.]. Explainable Machine Learning Challenge. https:\/\/community.fico.com\/s\/explainable-machine-learning-challenge"},{"key":"e_1_3_2_1_9_1","volume-title":"Support-vector networks. Machine learning 20, 3","author":"Cortes Corinna","year":"1995","unstructured":"Corinna Cortes and Vladimir Vapnik. 1995. Support-vector networks. Machine learning 20, 3 (1995), 273\u2013297."},{"key":"e_1_3_2_1_10_1","unstructured":"Amit Dhurandhar Pin-Yu Chen Ronny Luss Chun-Chen Tu Paishun Ting Karthikeyan Shanmugam and Payel Das. 2018. Explanations based on the missing: Towards contrastive explanations with pertinent negatives. In Advances in Neural Information Processing Systems. 592\u2013603."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/336"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000196"},{"key":"e_1_3_2_1_14_1","unstructured":"Ian\u00a0J Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572(2014)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0095-0696(78)90006-2"},{"key":"e_1_3_2_1_16_1","unstructured":"Masoud Hashemi and Ali Fathi. 2020. PermuteAttack: Counterfactual Explanation of Machine Learning Credit Scorecards. arXiv preprint arXiv:2008.10138(2020)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_18_1","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20). 1345\u20131362.","author":"Jagielski Matthew","unstructured":"Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, and Nicolas Papernot. 2020. High accuracy and high fidelity extraction of neural networks. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 1345\u20131362."},{"key":"e_1_3_2_1_19_1","unstructured":"Shalmali Joshi Oluwasanmi Koyejo Warut Vijitbenjaronk Been Kim and Joydeep Ghosh. 2019. Towards realistic individual recourse and actionable explanations in black-box decision making systems. arXiv preprint arXiv:1907.09615(2019)."},{"key":"e_1_3_2_1_20_1","volume-title":"Highly accurate protein structure prediction with AlphaFold. Nature 596, 7873","author":"Jumper John","year":"2021","unstructured":"John Jumper, Richard Evans, Alexander Pritzel, Tim Green, Michael Figurnov, Olaf Ronneberger, Kathryn Tunyasuvunakool, Russ Bates, Augustin \u017d\u00eddek, Anna Potapenko, 2021. Highly accurate protein structure prediction with AlphaFold. Nature 596, 7873 (2021), 583\u2013589."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00044"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445899"},{"key":"e_1_3_2_1_23_1","volume-title":"Algorithmic recourse under imperfect causal knowledge: a probabilistic approach. Advances in Neural Information Processing Systems 33","author":"Karimi Amir-Hossein","year":"2020","unstructured":"Amir-Hossein Karimi, Julius von K\u00fcgelgen, Bernhard Sch\u00f6lkopf, and Isabel Valera. 2020. Algorithmic recourse under imperfect causal knowledge: a probabilistic approach. Advances in Neural Information Processing Systems 33 (2020)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445886"},{"key":"e_1_3_2_1_25_1","volume-title":"International Conference on Learning Representations.","author":"Krishna Kalpesh","year":"2019","unstructured":"Kalpesh Krishna, Gaurav\u00a0Singh Tomar, Ankur\u00a0P Parikh, Nicolas Papernot, and Mohit Iyyer. 2019. Thieves on Sesame Street! Model Extraction of BERT-based APIs. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Thibault Laugel Marie-Jeanne Lesot Christophe Marsala Xavier Renard and Marcin Detyniecki. 2017. Inverse classification for comparison-based interpretability in machine learning. arXiv preprint arXiv:1712.08443(2017).","DOI":"10.1007\/978-3-319-91473-2_9"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.03.008"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287562"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372850"},{"key":"e_1_3_2_1_30_1","unstructured":"Nicholas. [n. d.]. EDA - Credit Scoring Top 100 on Leaderboard. https:\/\/www.kaggle.com\/nicholasgah\/eda-credit-scoring-top-100-on-leaderboard"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00509"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5432"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445903"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375850"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Hangwei Qian Sinno\u00a0Jialin Pan Bingshui Da and Chunyan Miao. 2019. A Novel Distribution-Embedded Neural Network for Sensor-Based Activity Recognition.. In IJCAI. 5614\u20135620.","DOI":"10.24963\/ijcai.2019\/779"},{"key":"e_1_3_2_1_37_1","unstructured":"Chenhao\u00a0Tan Ramaravind K.\u00a0Mothilal Amit\u00a0Sharma. [n. d.]. Diverse Counterfactual Explanations (DiCE) for ML. https:\/\/github.com\/interpretml\/DiCE"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287569"},{"key":"e_1_3_2_1_39_1","volume-title":"Active Learning for Convolutional Neural Networks: A Core-Set Approach. In International Conference on Learning Representations.","author":"Sener Ozan","year":"2018","unstructured":"Ozan Sener and Silvio Savarese. 2018. Active Learning for Convolutional Neural Networks: A Core-Set Approach. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_41_1","unstructured":"Karen Simonyan Andrea Vedaldi and Andrew Zisserman. 2013. Deep inside convolutional networks: Visualising image classification models and saliency maps. arXiv preprint arXiv:1312.6034(2013)."},{"key":"e_1_3_2_1_42_1","unstructured":"Kacper Sokol and Peter\u00a0A Flach. 2019. Counterfactual explanations of machine learning predictions: opportunities and challenges for AI safety. In SafeAI@ AAAI."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098039"},{"key":"e_1_3_2_1_44_1","volume-title":"25th {USENIX} Security Symposium ({USENIX} Security 16). 601\u2013618.","author":"Tram\u00e8r Florian","unstructured":"Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael\u00a0K Reiter, and Thomas Ristenpart. 2016. Stealing machine learning models via prediction apis. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 601\u2013618."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287566"},{"key":"e_1_3_2_1_46_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan\u00a0N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998\u20136008."},{"key":"e_1_3_2_1_47_1","unstructured":"Sahil Verma John Dickerson and Keegan Hines. 2020. Counterfactual Explanations for Machine Learning: A Review. arXiv preprint arXiv:2010.10596(2020)."},{"key":"e_1_3_2_1_48_1","first-page":"841","article-title":"Counterfactual explanations without opening the black box: Automated decisions and the GDPR","volume":"31","author":"Wachter Sandra","year":"2017","unstructured":"Sandra Wachter, Brent Mittelstadt, and Chris Russell. 2017. Counterfactual explanations without opening the black box: Automated decisions and the GDPR. Harv. JL & Tech. 31(2017), 841.","journal-title":"Harv. JL & Tech."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482397"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23115"},{"key":"e_1_3_2_1_51_1","unstructured":"Honggang Yu Kaichen Yang Teng Zhang Yun-Yun Tsai Tsung-Yi Ho and Yier Jin. 2020. CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples.. In NDSS."}],"event":{"name":"FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency","location":"Seoul Republic of Korea","acronym":"FAccT '22","sponsor":["ACM Association for Computing Machinery"]},"container-title":["2022 ACM Conference on Fairness Accountability and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3533188","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3531146.3533188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:09Z","timestamp":1750186929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3533188"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,20]]},"references-count":51,"alternative-id":["10.1145\/3531146.3533188","10.1145\/3531146"],"URL":"https:\/\/doi.org\/10.1145\/3531146.3533188","relation":{},"subject":[],"published":{"date-parts":[[2022,6,20]]},"assertion":[{"value":"2022-06-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}