{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T16:09:06Z","timestamp":1764778146381,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1145\/3769102.3774434","type":"proceedings-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T16:00:41Z","timestamp":1764777641000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Siamese: Stealing Fine-Tuned Visual Foundation Models via Diversified Prompting"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1893-8182","authenticated-orcid":false,"given":"Madhureeta","family":"Das","sequence":"first","affiliation":[{"name":"Michigan Technological University, Houghton, USA"},{"name":"Seacom Engineering College, Kolkata, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5706-5065","authenticated-orcid":false,"given":"Gaurav","family":"Bagwe","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2138-4413","authenticated-orcid":false,"given":"Miao","family":"Pan","sequence":"additional","affiliation":[{"name":"University of Houston, Houstan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1027-6708","authenticated-orcid":false,"given":"Kaichen","family":"Yang","sequence":"additional","affiliation":[{"name":"Michigan Technological University, Houghton, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0782-4187","authenticated-orcid":false,"given":"Xiaoyong (Brian)","family":"Yuan","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7718-6128","authenticated-orcid":false,"given":"Lan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,12,3]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"20120","article-title":"Black-box ripper: Copying black-box models using generative evolutionary algorithms","volume":"33","author":"Barbalau Antonio","year":"2020","unstructured":"Antonio Barbalau, Adrian Cosma, Radu Tudor Ionescu, and Marius Popescu. 2020. Black-box ripper: Copying black-box models using generative evolutionary algorithms. Advances in Neural Information Processing Systems 33 (2020), 20120\u201320129.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_2_1","volume-title":"Dual student networks for data-free model stealing. arXiv preprint arXiv:2309.10058","author":"Beetham James","year":"2023","unstructured":"James Beetham, Navid Kardan, Ajmal Mian, and Mubarak Shah. 2023. Dual student networks for data-free model stealing. arXiv preprint arXiv:2309.10058 (2023)."},{"key":"e_1_3_2_2_3_1","unstructured":"Rishi Bommasani Drew A Hudson Ehsan Adeli Russ Altman Simran Arora Sydney von Arx Michael S Bernstein Jeannette Bohg Antoine Bosselut Emma Brunskill et al. 2021. On the opportunities and risks of foundation models. arXiv preprint arXiv:2108.07258 (2021)."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00950"},{"key":"e_1_3_2_2_5_1","unstructured":"Alexey Dosovitskiy Lucas Beyer Alexander Kolesnikov Dirk Weissenborn Xiaohua Zhai Thomas Unterthiner Mostafa Dehghani Matthias Minderer Georg Heigold Sylvain Gelly et al. 2020. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2004.383"},{"key":"e_1_3_2_2_7_1","volume-title":"Towards a unified view of parameter-efficient transfer learning. arXiv preprint arXiv:2110.04366","author":"He Junxian","year":"2021","unstructured":"Junxian He, Chunting Zhou, Xuezhe Ma, Taylor Berg-Kirkpatrick, and Graham Neubig. 2021. Towards a unified view of parameter-efficient transfer learning. arXiv preprint arXiv:2110.04366 (2021)."},{"key":"e_1_3_2_2_8_1","volume-title":"Lora: Low-rank adaptation of large language models. arXiv preprint arXiv:2106.09685","author":"Hu Edward J","year":"2021","unstructured":"Edward J Hu, Yelong Shen, Phillip Wallis, Zeyuan Allen-Zhu, Yuanzhi Li, Shean Wang, Lu Wang, and Weizhu Chen. 2021. Lora: Low-rank adaptation of large language models. arXiv preprint arXiv:2106.09685 (2021)."},{"key":"e_1_3_2_2_9_1","volume-title":"Learning a better initialization for soft prompts via meta-learning. arXiv preprint arXiv:2205.12471","author":"Huang Yukun","year":"2022","unstructured":"Yukun Huang, Kun Qian, and Zhou Yu. 2022. Learning a better initialization for soft prompts via meta-learning. arXiv preprint arXiv:2205.12471 (2022)."},{"key":"e_1_3_2_2_10_1","volume-title":"29th USENIX security symposium (USENIX Security 20). 1345\u20131362.","author":"Jagielski Matthew","unstructured":"Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, and Nicolas Papernot. 2020. High accuracy and high fidelity extraction of neural networks. In 29th USENIX security symposium (USENIX Security 20). 1345\u20131362."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19827-4_41"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01360"},{"key":"e_1_3_2_2_13_1","volume-title":"Proceedings, Part V 16","author":"Kolesnikov Alexander","year":"2020","unstructured":"Alexander Kolesnikov, Lucas Beyer, Xiaohua Zhai, Joan Puigcerver, Jessica Yung, Sylvain Gelly, and Neil Houlsby. 2020. Big transfer (bit): General visual representation learning. In Computer Vision-ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part V 16. Springer, 491\u2013507."},{"key":"e_1_3_2_2_14_1","unstructured":"Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_2_15_1","volume-title":"Defending against model stealing attacks using deceptive perturbations. arXiv preprint arXiv:1806.00054","author":"Lee Taesung","year":"2018","unstructured":"Taesung Lee, Benjamin Edwards, Ian Molloy, and Dong Su. 2018. Defending against model stealing attacks using deceptive perturbations. arXiv preprint arXiv:1806.00054 (2018)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"e_1_3_2_2_17_1","volume-title":"I know what you trained last summer: A survey on stealing machine learning models and defences. Comput. Surveys","author":"Oliynyk Daryna","year":"2023","unstructured":"Daryna Oliynyk, Rudolf Mayer, and Andreas Rauber. 2023. I know what you trained last summer: A survey on stealing machine learning models and defences. Comput. Surveys (2023)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i8.26150"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01485"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Johannes Schneider Christian Meske and Pauline Kuss. 2024. Foundation Models. Business & Information Systems Engineering (2024).","DOI":"10.1007\/s12599-024-00851-0"},{"key":"e_1_3_2_2_21_1","volume-title":"25th USENIX security symposium (USENIX Security 16). 601\u2013618.","author":"Tram\u00e8r Florian","unstructured":"Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2016. Stealing machine learning models via prediction {APIs}. In 25th USENIX security symposium (USENIX Security 16). 601\u2013618."},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 4771\u20134780","author":"Truong Jean-Baptiste","year":"2021","unstructured":"Jean-Baptiste Truong, Pratyush Maini, Robert J Walls, and Nicolas Papernot. 2021. Data-free model extraction. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 4771\u20134780."},{"key":"e_1_3_2_2_23_1","first-page":"102","article-title":"CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples","volume":"38","author":"Yu Honggang","year":"2020","unstructured":"Honggang Yu, Kaichen Yang, Teng Zhang, Yun-Yun Tsai, Tsung-Yi Ho, and Yier Jin. 2020. CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples.. In NDSS, Vol. 38. 102.","journal-title":"NDSS"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","first-page":"1258","DOI":"10.1109\/TETCI.2022.3147508","article-title":"ES Attack: Model Stealing Against Deep Neural Networks Without Data Hurdles","volume":"6","author":"Yuan Xiaoyong","year":"2020","unstructured":"Xiaoyong Yuan, Lei Ding, Lan Zhang, Xiaolin Li, and Dapeng Oliver Wu. 2020. ES Attack: Model Stealing Against Deep Neural Networks Without Data Hurdles. IEEE Transactions on Emerging Topics in Computational Intelligence 6 (2020), 1258\u20131270. https:\/\/api.semanticscholar.org\/CorpusID:221818932","journal-title":"IEEE Transactions on Emerging Topics in Computational Intelligence"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3246766"},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings, Part III 16","author":"Zhang Jeffrey O","year":"2020","unstructured":"Jeffrey O Zhang, Alexander Sax, Amir Zamir, Leonidas Guibas, and Jitendra Malik. 2020. Side-tuning: a baseline for network adaptation via additive side networks. In Computer Vision-ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part III 16. Springer, 698\u2013714."}],"event":{"name":"SEC '25: Tenth ACM\/IEEE Symposium on Edge Computing","location":"the Hilton Arlington National Landing Arlington VA USA","acronym":"SEC '25","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","IEEE Computer Society"]},"container-title":["Proceedings of the Tenth ACM\/IEEE Symposium on Edge Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769102.3774434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T16:04:44Z","timestamp":1764777884000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769102.3774434"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":26,"alternative-id":["10.1145\/3769102.3774434","10.1145\/3769102"],"URL":"https:\/\/doi.org\/10.1145\/3769102.3774434","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]},"assertion":[{"value":"2025-12-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}