Search papers, labs, and topics across Lattice.
2
0
3
Stop model extraction attacks on your GNNs without sacrificing accuracy: CITED uses a novel decision boundary signature to prove ownership at both the embedding and label levels.
Finally, a defense against model extraction comes with rigorous theoretical guarantees, using mutual information to certify DNN ownership.