Research Article

Neural Model Stealing Attack to Smart Mobile Device on Intelligent Medical Platform

Figure 4

On the left side, the target network is trained by an original data set and is available as an API, input text data, and output class labels. The right side shows the process of obtaining stolen tags and creating pseudo data sets: sending a random natural text data set to the API to obtain tags. Then, this pseudo data is used set to train the imitation network.