A Survey of Model Extraction Attacks and Defenses in Distributed Computing Environments

Open in new window