Adversaries use clever techniques like query-response mechanism to either steal or extract your valuable AI/ML models without breaching system security. This technical talk discusses many of such techniques along with real-life practical examples & implications of these threats for enterprises. Then the talk focuses on building active/passive detection measures & defenses to protect AI/ML models.