SOTAVerified

Membership Inference Attack

Papers

Showing 126150 of 186 papers

TitleStatusHype
Orthogonal Soft Pruning for Efficient Class Unlearning0
Over-the-Air Membership Inference Attacks as Privacy Threats for Deep Learning-based Wireless Signal Classifiers0
White-box Membership Attack Against Machine Learning Based Retinopathy Classification0
Impact of Dataset Properties on Membership Inference Vulnerability of Deep Transfer Learning0
An Extension of Fano's Inequality for Characterizing Model Susceptibility to Membership Inference Attacks0
A new membership inference attack that spots memorization in generative and predictive models: Loss-Based with Reference Model algorithm (LBRM)0
Preserving Privacy in GANs Against Membership Inference Attack0
Unlearning Clients, Features and Samples in Vertical Federated Learning0
Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models0
Unveiling Structural Memorization: Structural Membership Inference Attack for Text-to-Image Diffusion Models0
Unveiling Synthetic Faces: How Synthetic Datasets Can Expose Real Identities0
Privacy-Preserving Collaborative Learning through Feature Extraction0
Privacy-Preserving Representation Learning for Text-Attributed Networks with Simplicial Complexes0
Privacy Risk for anisotropic Langevin dynamics using relative entropy bounds0
Privacy Vulnerabilities in Marginals-based Synthetic Data0
Purifier: Defending Data Inference Attacks via Transforming Confidence Scores0
Quantifying Membership Inference Vulnerability via Generalization Gap and Other Model Metrics0
Quantifying Privacy Risks of Masked Language Models Using Membership Inference Attacks0
ReCaLL: Membership Inference via Relative Conditional Log-Likelihoods0
User-Level Membership Inference Attack against Metric Embedding Learning0
Redefining Machine Unlearning: A Conformal Prediction-Motivated Approach0
Reducing audio membership inference attack accuracy to chance: 4 defenses0
An Efficient Subpopulation-based Membership Inference Attack0
An Analysis Of Protected Health Information Leakage In Deep-Learning Based De-Identification Algorithms0
WaKA: Data Attribution using K-Nearest Neighbors and Membership Privacy Principles0
Show:102550
← PrevPage 6 of 8Next →

No leaderboard results yet.