SOTAVerified

Reconstruction Attack

Facial reconstruction attack of facial manipulation models such as: Face swapping models, anonymization models, etc.

Papers

Showing 125 of 68 papers

TitleStatusHype
Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and ReconstructionCode2
Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT ModelsCode1
Trained Random Forests Completely Reveal your DatasetCode1
Inference Attacks Against Graph Neural NetworksCode1
TabLeak: Tabular Data Leakage in Federated LearningCode1
On Strengthening and Defending Graph Reconstruction Attack with Markov Chain ApproximationCode1
Confidence-Ranked Reconstruction of Census Microdata from Published StatisticsCode1
Reconstructing Training Data with Informed AdversariesCode1
Vicious Classifiers: Assessing Inference-time Data Reconstruction Risk in Edge ComputingCode0
Face Reconstruction Transfer Attack as Out-of-Distribution GeneralizationCode0
A Review of Anonymization for Healthcare DataCode0
When the Curious Abandon Honesty: Federated Learning Is Not PrivateCode0
An Examination of the Alleged Privacy Threats of Confidence-Ranked Reconstruction of Census MicrodataCode0
Towards General Deep Leakage in Federated LearningCode0
RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data ManipulationCode0
Privacy Attacks in Decentralized LearningCode0
URVFL: Undetectable Data Reconstruction Attack on Vertical Federated LearningCode0
Investigating Privacy Leakage in Dimensionality Reduction Methods via Reconstruction AttackCode0
Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset DistillationCode0
How Private Is Your RL Policy? An Inverse RL Based Analysis FrameworkCode0
LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model ManipulationCode0
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based SystemsCode0
Training Set Reconstruction from Differentially Private Forests: How Effective is DP?Code0
Feature Reconstruction Attacks and Countermeasures of DNN training in Vertical Federated LearningCode0
Cutting Through Privacy: A Hyperplane-Based Data Reconstruction Attack in Federated Learning0
Show:102550
← PrevPage 1 of 3Next →

No leaderboard results yet.