SOTAVerified

Reconstruction Attack

Facial reconstruction attack of facial manipulation models such as: Face swapping models, anonymization models, etc.

Papers

Showing 125 of 68 papers

TitleStatusHype
DRAGD: A Federated Unlearning Data Reconstruction Attack Based on Gradient Differences0
Byzantine Outside, Curious Inside: Reconstructing Data Through Malicious Updates0
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based SystemsCode0
ReconXF: Graph Reconstruction Attack via Public Feature Explanations on Privatized Node Features and Labels0
Cutting Through Privacy: A Hyperplane-Based Data Reconstruction Attack in Federated Learning0
VVRec: Reconstruction Attacks on DL-based Volumetric Video Upstreaming via Latent Diffusion Model with Gamma Distribution0
Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy0
Training Set Reconstruction from Differentially Private Forests: How Effective is DP?Code0
LATTEO: A Framework to Support Learning Asynchronously Tempered with Trusted Execution and Obfuscation0
A Multiparty Homomorphic Encryption Approach to Confidential Federated Kaplan Meier Survival Analysis0
Hidden Data Privacy Breaches in Federated Learning0
Face Reconstruction from Face Embeddings using Adapter to a Face Foundation Model0
Investigating Privacy Leakage in Dimensionality Reduction Methods via Reconstruction AttackCode0
Supervised and Unsupervised Alignments for Spoofing Behavioral Biometrics0
Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information Hiding0
Face Reconstruction Transfer Attack as Out-of-Distribution GeneralizationCode0
Bayes' capacity as a measure for reconstruction attacks in federated learning0
UIFV: Data Reconstruction Attack in Vertical Federated Learning0
Is Diffusion Model Safe? Severe Data Leakage via Gradient-Guided Diffusion Model0
URVFL: Undetectable Data Reconstruction Attack on Vertical Federated LearningCode0
Visual Privacy Auditing with Diffusion Models0
Trained Random Forests Completely Reveal your DatasetCode1
Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and ReconstructionCode2
MIP: CLIP-based Image Reconstruction from PEFT Gradients0
Bounding Reconstruction Attack Success of Adversaries Without Data Priors0
Show:102550
← PrevPage 1 of 3Next →

No leaderboard results yet.