SOTAVerified

Reconstruction Attack

Facial reconstruction attack of facial manipulation models such as: Face swapping models, anonymization models, etc.

Papers

Showing 125 of 68 papers

TitleStatusHype
Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and ReconstructionCode2
Trained Random Forests Completely Reveal your DatasetCode1
Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT ModelsCode1
On Strengthening and Defending Graph Reconstruction Attack with Markov Chain ApproximationCode1
Confidence-Ranked Reconstruction of Census Microdata from Published StatisticsCode1
TabLeak: Tabular Data Leakage in Federated LearningCode1
Reconstructing Training Data with Informed AdversariesCode1
Inference Attacks Against Graph Neural NetworksCode1
DRAGD: A Federated Unlearning Data Reconstruction Attack Based on Gradient Differences0
Byzantine Outside, Curious Inside: Reconstructing Data Through Malicious Updates0
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based SystemsCode0
ReconXF: Graph Reconstruction Attack via Public Feature Explanations on Privatized Node Features and Labels0
Cutting Through Privacy: A Hyperplane-Based Data Reconstruction Attack in Federated Learning0
VVRec: Reconstruction Attacks on DL-based Volumetric Video Upstreaming via Latent Diffusion Model with Gamma Distribution0
Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy0
LATTEO: A Framework to Support Learning Asynchronously Tempered with Trusted Execution and Obfuscation0
Training Set Reconstruction from Differentially Private Forests: How Effective is DP?Code0
A Multiparty Homomorphic Encryption Approach to Confidential Federated Kaplan Meier Survival Analysis0
Hidden Data Privacy Breaches in Federated Learning0
Face Reconstruction from Face Embeddings using Adapter to a Face Foundation Model0
Investigating Privacy Leakage in Dimensionality Reduction Methods via Reconstruction AttackCode0
Supervised and Unsupervised Alignments for Spoofing Behavioral Biometrics0
Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information Hiding0
Face Reconstruction Transfer Attack as Out-of-Distribution GeneralizationCode0
Bayes' capacity as a measure for reconstruction attacks in federated learning0
Show:102550
← PrevPage 1 of 3Next →

No leaderboard results yet.