I Stolenly Swear That I Am Up to (No) Good: Design and Evaluation of Model Stealing Attacks

Open in new window