From Counterfactuals to Trees: Competitive Analysis of Model Extraction Attacks | Read Paper on Bytez