In this lecture, we define model extraction and the motivations behind the attack; model extraction threat models; model extraction strategies; connection between model extraction and other attacks such as adversarial examples and privacy motivated inference attacks; and defense countermeasures against model extraction.
Course website: https://trustworthy-ml-course.github.io/