SOTAVerified

Inference Attack

Papers

Showing 51100 of 283 papers

TitleStatusHype
A Privacy-Preserving Unsupervised Domain Adaptation Framework for Clinical Text Analysis0
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks0
Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs0
Trade-offs and Guarantees of Adversarial Representation Learning for Information Obfuscation0
Knowledge Cross-Distillation for Membership Privacy0
On the Alignment of Group Fairness with Attribute Privacy0
Data Plagiarism Index: Characterizing the Privacy Risk of Data-Copying in Tabular Generative Models0
A Novel Membership Inference Attack against Dynamic Neural Networks by Utilizing Policy Networks Information0
DAMIA: Leveraging Domain Adaptation as a Defense against Membership Inference Attacks0
Curvature Clues: Decoding Deep Learning Privacy with Input Loss Curvature0
Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges0
Batch Label Inference and Replacement Attacks in Black-Boxed Vertical Federated Learning0
An Out-Of-Distribution Membership Inference Attack Approach for Cross-Domain Graph Attacks0
An Extension of Fano's Inequality for Characterizing Model Susceptibility to Membership Inference Attacks0
Comprehensive Privacy Analysis on Federated Recommender System against Attribute Inference Attacks0
Adversarial Privacy Preservation under Attribute Inference Attack0
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks0
Inferring Communities of Interest in Collaborative Learning-based Recommender Systems0
Federated Graph Condensation with Information Bottleneck Principles0
A new membership inference attack that spots memorization in generative and predictive models: Loss-Based with Reference Model algorithm (LBRM)0
Similarity-based Label Inference Attack against Training and Inference of Split Learning0
Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services0
Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls0
Interaction-level Membership Inference Attack Against Federated Recommender Systems0
Is My Data in Your Retrieval Database? Membership Inference Attacks Against Retrieval Augmented Generation0
Local Model Reconstruction Attacks in Federated Learning and their Uses0
An Efficient Subpopulation-based Membership Inference Attack0
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning0
A Comprehensive Study of Privacy Risks in Curriculum Learning0
BLIA: Detect model memorization in binary classification model through passive Label Inference attack0
Eliminating Label Leakage in Tree-Based Vertical Federated Learning0
Identity-Focused Inference and Extraction Attacks on Diffusion Models0
Inference Attacks Against Face Recognition Model without Classification Layers0
Efficient Membership Inference Attacks by Bayesian Neural Network0
Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability0
Black-Box Training Data Identification in GANs via Detector Networks0
Effectiveness of L2 Regularization in Privacy-Preserving Machine Learning0
EC-LDA : Label Distribution Inference Attack against Federated Graph Learning with Embedding Compression0
Bounding Information Leakage in Machine Learning0
Epsilon*: Privacy Metric for Machine Learning Models0
A Blessing of Dimensionality in Membership Inference through Regularization0
Evaluation of Inference Attack Models for Deep Learning on Medical Data0
An Analysis Of Protected Health Information Leakage In Deep-Learning Based De-Identification Algorithms0
EXPLORING VULNERABILITIES OF BERT-BASED APIS0
Eavesdrop the Composition Proportion of Training Labels in Federated Learning0
Exposing Privacy Gaps: Membership Inference Attack on Preference Data for LLM Alignment0
A Zero Auxiliary Knowledge Membership Inference Attack on Aggregate Location Data0
Feature Inference Attack on Shapley Values0
Pathway to Secure and Trustworthy ZSM for LLMs: Attacks, Defense, and Opportunities0
A Volumetric Approach to Privacy of Dynamical Systems0
Show:102550
← PrevPage 2 of 6Next →

No leaderboard results yet.