SOTAVerified

Reconstruction Attack

Facial reconstruction attack of facial manipulation models such as: Face swapping models, anonymization models, etc.

Papers

Showing 125 of 68 papers

TitleStatusHype
Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and ReconstructionCode2
Reconstructing Training Data with Informed AdversariesCode1
Trained Random Forests Completely Reveal your DatasetCode1
Inference Attacks Against Graph Neural NetworksCode1
Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT ModelsCode1
TabLeak: Tabular Data Leakage in Federated LearningCode1
On Strengthening and Defending Graph Reconstruction Attack with Markov Chain ApproximationCode1
Confidence-Ranked Reconstruction of Census Microdata from Published StatisticsCode1
Bayes' capacity as a measure for reconstruction attacks in federated learning0
Fuzzy Commitments Offer Insufficient Protection to Biometric Templates Produced by Deep Learning0
Gradient Obfuscation Gives a False Sense of Security in Federated Learning0
Hidden Data Privacy Breaches in Federated Learning0
Cutting Through Privacy: A Hyperplane-Based Data Reconstruction Attack in Federated Learning0
Cloud-based Federated Boosting for Mobile Crowdsensing0
Byzantine Outside, Curious Inside: Reconstructing Data Through Malicious Updates0
Approximate and Weighted Data Reconstruction Attack in Federated Learning0
Defending against Reconstruction Attack in Vertical Federated Learning0
Deconstructing Classifiers: Towards A Data Reconstruction Attack Against Text Classification Models0
Differentially Private Instance Encoding against Privacy Attacks0
Does Black-box Attribute Inference Attacks on Graph Neural Networks Constitute Privacy Risk?0
DRAGD: A Federated Unlearning Data Reconstruction Attack Based on Gradient Differences0
Face Reconstruction from Face Embeddings using Adapter to a Face Foundation Model0
Bounding Training Data Reconstruction in DP-SGD0
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning0
Bounding Reconstruction Attack Success of Adversaries Without Data Priors0
Show:102550
← PrevPage 1 of 3Next →

No leaderboard results yet.