| Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction | Feb 28, 2024 | ChatbotReconstruction Attack | CodeCode Available | 2 | 5 |
| Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT Models | Feb 5, 2024 | Reconstruction AttackSemantic Similarity | CodeCode Available | 1 | 5 |
| Reconstructing Training Data with Informed Adversaries | Jan 13, 2022 | MemorizationReconstruction Attack | CodeCode Available | 1 | 5 |
| On Strengthening and Defending Graph Reconstruction Attack with Markov Chain Approximation | Jun 15, 2023 | Graph ReconstructionReconstruction Attack | CodeCode Available | 1 | 5 |
| TabLeak: Tabular Data Leakage in Federated Learning | Oct 4, 2022 | Federated LearningReconstruction Attack | CodeCode Available | 1 | 5 |
| Inference Attacks Against Graph Neural Networks | Oct 6, 2021 | Graph ClassificationGraph Embedding | CodeCode Available | 1 | 5 |
| Confidence-Ranked Reconstruction of Census Microdata from Published Statistics | Nov 6, 2022 | Reconstruction Attack | CodeCode Available | 1 | 5 |
| Trained Random Forests Completely Reveal your Dataset | Feb 29, 2024 | Reconstruction Attack | CodeCode Available | 1 | 5 |
| LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation | Mar 21, 2023 | Federated LearningReconstruction Attack | CodeCode Available | 0 | 5 |
| TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems | Jun 9, 2025 | Federated LearningPrivacy Preserving | CodeCode Available | 0 | 5 |
| Towards General Deep Leakage in Federated Learning | Oct 18, 2021 | Federated LearningImage Restoration | CodeCode Available | 0 | 5 |
| Training Set Reconstruction from Differentially Private Forests: How Effective is DP? | Feb 7, 2025 | Reconstruction Attack | CodeCode Available | 0 | 5 |
| A Review of Anonymization for Healthcare Data | Apr 13, 2021 | Reconstruction Attack | CodeCode Available | 0 | 5 |
| Vicious Classifiers: Assessing Inference-time Data Reconstruction Risk in Edge Computing | Dec 8, 2022 | Edge-computingPrivacy Preserving | CodeCode Available | 0 | 5 |
| How Private Is Your RL Policy? An Inverse RL Based Analysis Framework | Dec 10, 2021 | Adversarial AttackAutonomous Driving | CodeCode Available | 0 | 5 |
| Privacy Attacks in Decentralized Learning | Feb 15, 2024 | Reconstruction Attack | CodeCode Available | 0 | 5 |
| When the Curious Abandon Honesty: Federated Learning Is Not Private | Dec 6, 2021 | Federated LearningPrivacy Preserving | CodeCode Available | 0 | 5 |
| An Examination of the Alleged Privacy Threats of Confidence-Ranked Reconstruction of Census Microdata | Nov 6, 2023 | AttributeReconstruction Attack | CodeCode Available | 0 | 5 |
| Investigating Privacy Leakage in Dimensionality Reduction Methods via Reconstruction Attack | Aug 30, 2024 | Dimensionality ReductionReconstruction Attack | CodeCode Available | 0 | 5 |
| RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation | Oct 29, 2023 | Federated LearningInformation Retrieval | CodeCode Available | 0 | 5 |
| Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset Distillation | Feb 2, 2023 | Dataset DistillationReconstruction Attack | CodeCode Available | 0 | 5 |
| Face Reconstruction Transfer Attack as Out-of-Distribution Generalization | Jul 2, 2024 | Face RecognitionFace Reconstruction | CodeCode Available | 0 | 5 |
| URVFL: Undetectable Data Reconstruction Attack on Vertical Federated Learning | Apr 30, 2024 | Federated LearningReconstruction Attack | CodeCode Available | 0 | 5 |
| Feature Reconstruction Attacks and Countermeasures of DNN training in Vertical Federated Learning | Oct 13, 2022 | Federated LearningReconstruction Attack | CodeCode Available | 0 | 5 |
| Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy | Feb 12, 2025 | DenoisingFederated Learning | —Unverified | 0 | 0 |
| Local Model Reconstruction Attacks in Federated Learning and their Uses | Oct 28, 2022 | AttributeEarnings Classification | —Unverified | 0 | 0 |
| Measuring the Privacy Leakage via Graph Reconstruction Attacks on Simplicial Neural Networks (Student Abstract) | Feb 8, 2023 | DecoderGraph Attention | —Unverified | 0 | 0 |
| MIP: CLIP-based Image Reconstruction from PEFT Gradients | Feb 26, 2024 | Federated LearningImage Reconstruction | —Unverified | 0 | 0 |
| HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning | Dec 1, 2022 | Federated LearningReconstruction Attack | —Unverified | 0 | 0 |
| On the Reconstruction of Face Images from Deep Face Templates | Mar 2, 2017 | Face RecognitionReconstruction Attack | —Unverified | 0 | 0 |
| Privacy-Preserving Medical Image Classification through Deep Learning and Matrix Decomposition | Aug 31, 2023 | image-classificationImage Classification | —Unverified | 0 | 0 |
| Privacy Safe Representation Learning via Frequency Filtering Encoder | Aug 4, 2022 | image-classificationImage Classification | —Unverified | 0 | 0 |
| PrivMVMF: Privacy-Preserving Multi-View Matrix Factorization for Recommender Systems | Sep 29, 2022 | Federated LearningPrivacy Preserving | —Unverified | 0 | 0 |
| Reconstruction Attack on Instance Encoding for Language Understanding | Nov 1, 2021 | Privacy PreservingReconstruction Attack | —Unverified | 0 | 0 |
| ReconXF: Graph Reconstruction Attack via Public Feature Explanations on Privatized Node Features and Labels | Jun 2, 2025 | DenoisingGraph Reconstruction | —Unverified | 0 | 0 |
| RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense | Apr 11, 2023 | Adversarial AttackAttribute | —Unverified | 0 | 0 |
| SAPAG: A Self-Adaptive Privacy Attack From Gradients | Sep 14, 2020 | Federated LearningReconstruction Attack | —Unverified | 0 | 0 |
| Supervised and Unsupervised Alignments for Spoofing Behavioral Biometrics | Aug 14, 2024 | Reconstruction AttackSpeaker Verification | —Unverified | 0 | 0 |
| Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis | Oct 26, 2020 | Face RecognitionReconstruction Attack | —Unverified | 0 | 0 |
| UIFV: Data Reconstruction Attack in Vertical Federated Learning | Jun 18, 2024 | Federated LearningReconstruction Attack | —Unverified | 0 | 0 |
| Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information Hiding | Aug 8, 2024 | Reconstruction Attack | —Unverified | 0 | 0 |
| Visual Privacy Auditing with Diffusion Models | Mar 12, 2024 | Image ReconstructionReconstruction Attack | —Unverified | 0 | 0 |
| Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack | Aug 23, 2020 | Face DetectionFace Recognition | —Unverified | 0 | 0 |
| VVRec: Reconstruction Attacks on DL-based Volumetric Video Upstreaming via Latent Diffusion Model with Gamma Distribution | Feb 25, 2025 | Autonomous DrivingMixed Reality | —Unverified | 0 | 0 |
| The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against "Truly Anonymous" Synthetic Datasets | Dec 8, 2023 | AttributePrivacy Preserving | —Unverified | 0 | 0 |
| A Multiparty Homomorphic Encryption Approach to Confidential Federated Kaplan Meier Survival Analysis | Dec 29, 2024 | Privacy PreservingReconstruction Attack | —Unverified | 0 | 0 |
| A Novel Attribute Reconstruction Attack in Federated Learning | Aug 16, 2021 | AttributeFederated Learning | —Unverified | 0 | 0 |
| Approximate and Weighted Data Reconstruction Attack in Federated Learning | Aug 13, 2023 | Bayesian OptimizationFederated Learning | —Unverified | 0 | 0 |
| Bayes' capacity as a measure for reconstruction attacks in federated learning | Jun 19, 2024 | Federated LearningReconstruction Attack | —Unverified | 0 | 0 |
| Bounding Reconstruction Attack Success of Adversaries Without Data Priors | Feb 20, 2024 | Reconstruction Attack | —Unverified | 0 | 0 |