Search Results for author: Mika Juuti

Found 6 papers, 3 papers with code

Extraction of Complex DNN Models: Real Threat or Boogeyman?

no code implementations11 Oct 2019 Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan

However, model extraction attacks can steal the functionality of ML models using the information leaked to clients through the results returned via the API.

Model extraction

Making targeted black-box evasion attacks effective and efficient

no code implementations8 Jun 2019 Mika Juuti, Buse Gul Atli, N. Asokan

We investigate how an adversary can optimally use its query budget for targeted evasion attacks against deep neural networks in a black-box setting.

All You Need is "Love": Evading Hate-speech Detection

no code implementations28 Aug 2018 Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan

With the spread of social networks and their unfortunate use for hate speech, automatic detection of the latter has become a pressing problem.

Hate Speech Detection

Stay On-Topic: Generating Context-specific Fake Restaurant Reviews

1 code implementation7 May 2018 Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan

Automatically generated fake restaurant reviews are a threat to online review systems.

Machine Translation NMT

PRADA: Protecting against DNN Model Stealing Attacks

2 code implementations7 May 2018 Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan

Access to the model can be restricted to be only via well-defined prediction APIs.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.