SOTAVerified

Reconstruction Attack

Facial reconstruction attack of facial manipulation models such as: Face swapping models, anonymization models, etc.

Papers

Showing 150 of 68 papers

TitleStatusHype
Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and ReconstructionCode2
On Strengthening and Defending Graph Reconstruction Attack with Markov Chain ApproximationCode1
Inference Attacks Against Graph Neural NetworksCode1
Confidence-Ranked Reconstruction of Census Microdata from Published StatisticsCode1
Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT ModelsCode1
Reconstructing Training Data with Informed AdversariesCode1
Trained Random Forests Completely Reveal your DatasetCode1
TabLeak: Tabular Data Leakage in Federated LearningCode1
Cloud-based Federated Boosting for Mobile Crowdsensing0
Cutting Through Privacy: A Hyperplane-Based Data Reconstruction Attack in Federated Learning0
Data Reconstruction Attacks and Defenses: A Systematic Evaluation0
Deconstructing Classifiers: Towards A Data Reconstruction Attack Against Text Classification Models0
Defending against Reconstruction Attack in Vertical Federated Learning0
Differentially Private Instance Encoding against Privacy Attacks0
Does Black-box Attribute Inference Attacks on Graph Neural Networks Constitute Privacy Risk?0
DRAGD: A Federated Unlearning Data Reconstruction Attack Based on Gradient Differences0
Face Reconstruction from Face Embeddings using Adapter to a Face Foundation Model0
FIVA: Facial Image and Video Anonymization and Anonymization Defense0
Fuzzy Commitments Offer Insufficient Protection to Biometric Templates Produced by Deep Learning0
Gradient Obfuscation Gives a False Sense of Security in Federated Learning0
Hidden Data Privacy Breaches in Federated Learning0
ReconXF: Graph Reconstruction Attack via Public Feature Explanations on Privatized Node Features and Labels0
A Multiparty Homomorphic Encryption Approach to Confidential Federated Kaplan Meier Survival Analysis0
A Novel Attribute Reconstruction Attack in Federated Learning0
Approximate and Weighted Data Reconstruction Attack in Federated Learning0
Bayes' capacity as a measure for reconstruction attacks in federated learning0
Bounding Reconstruction Attack Success of Adversaries Without Data Priors0
Bounding Training Data Reconstruction in DP-SGD0
Byzantine Outside, Curious Inside: Reconstructing Data Through Malicious Updates0
The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against "Truly Anonymous" Synthetic Datasets0
On the Reconstruction of Face Images from Deep Face Templates0
Privacy-Preserving Medical Image Classification through Deep Learning and Matrix Decomposition0
Privacy Safe Representation Learning via Frequency Filtering Encoder0
PrivMVMF: Privacy-Preserving Multi-View Matrix Factorization for Recommender Systems0
Reconstruction Attack on Instance Encoding for Language Understanding0
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning0
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense0
SAPAG: A Self-Adaptive Privacy Attack From Gradients0
Supervised and Unsupervised Alignments for Spoofing Behavioral Biometrics0
Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis0
UIFV: Data Reconstruction Attack in Vertical Federated Learning0
Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information Hiding0
Visual Privacy Auditing with Diffusion Models0
Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack0
VVRec: Reconstruction Attacks on DL-based Volumetric Video Upstreaming via Latent Diffusion Model with Gamma Distribution0
Input Reconstruction Attack against Vertical Federated Large Language Models0
Is Diffusion Model Safe? Severe Data Leakage via Gradient-Guided Diffusion Model0
LATTEO: A Framework to Support Learning Asynchronously Tempered with Trusted Execution and Obfuscation0
Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy0
Local Model Reconstruction Attacks in Federated Learning and their Uses0
Show:102550
← PrevPage 1 of 2Next →

No leaderboard results yet.