SOTAVerified

Reconstruction Attack

Facial reconstruction attack of facial manipulation models such as: Face swapping models, anonymization models, etc.

Papers

Showing 150 of 68 papers

TitleStatusHype
Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and ReconstructionCode2
Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT ModelsCode1
Reconstructing Training Data with Informed AdversariesCode1
On Strengthening and Defending Graph Reconstruction Attack with Markov Chain ApproximationCode1
TabLeak: Tabular Data Leakage in Federated LearningCode1
Inference Attacks Against Graph Neural NetworksCode1
Confidence-Ranked Reconstruction of Census Microdata from Published StatisticsCode1
Trained Random Forests Completely Reveal your DatasetCode1
LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model ManipulationCode0
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based SystemsCode0
Towards General Deep Leakage in Federated LearningCode0
Training Set Reconstruction from Differentially Private Forests: How Effective is DP?Code0
A Review of Anonymization for Healthcare DataCode0
Vicious Classifiers: Assessing Inference-time Data Reconstruction Risk in Edge ComputingCode0
How Private Is Your RL Policy? An Inverse RL Based Analysis FrameworkCode0
Privacy Attacks in Decentralized LearningCode0
When the Curious Abandon Honesty: Federated Learning Is Not PrivateCode0
An Examination of the Alleged Privacy Threats of Confidence-Ranked Reconstruction of Census MicrodataCode0
Investigating Privacy Leakage in Dimensionality Reduction Methods via Reconstruction AttackCode0
RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data ManipulationCode0
Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset DistillationCode0
Face Reconstruction Transfer Attack as Out-of-Distribution GeneralizationCode0
URVFL: Undetectable Data Reconstruction Attack on Vertical Federated LearningCode0
Feature Reconstruction Attacks and Countermeasures of DNN training in Vertical Federated LearningCode0
Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy0
Local Model Reconstruction Attacks in Federated Learning and their Uses0
Measuring the Privacy Leakage via Graph Reconstruction Attacks on Simplicial Neural Networks (Student Abstract)0
MIP: CLIP-based Image Reconstruction from PEFT Gradients0
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning0
On the Reconstruction of Face Images from Deep Face Templates0
Privacy-Preserving Medical Image Classification through Deep Learning and Matrix Decomposition0
Privacy Safe Representation Learning via Frequency Filtering Encoder0
PrivMVMF: Privacy-Preserving Multi-View Matrix Factorization for Recommender Systems0
Reconstruction Attack on Instance Encoding for Language Understanding0
ReconXF: Graph Reconstruction Attack via Public Feature Explanations on Privatized Node Features and Labels0
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense0
SAPAG: A Self-Adaptive Privacy Attack From Gradients0
Supervised and Unsupervised Alignments for Spoofing Behavioral Biometrics0
Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis0
UIFV: Data Reconstruction Attack in Vertical Federated Learning0
Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information Hiding0
Visual Privacy Auditing with Diffusion Models0
Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack0
VVRec: Reconstruction Attacks on DL-based Volumetric Video Upstreaming via Latent Diffusion Model with Gamma Distribution0
The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against "Truly Anonymous" Synthetic Datasets0
A Multiparty Homomorphic Encryption Approach to Confidential Federated Kaplan Meier Survival Analysis0
A Novel Attribute Reconstruction Attack in Federated Learning0
Approximate and Weighted Data Reconstruction Attack in Federated Learning0
Bayes' capacity as a measure for reconstruction attacks in federated learning0
Bounding Reconstruction Attack Success of Adversaries Without Data Priors0
Show:102550
← PrevPage 1 of 2Next →

No leaderboard results yet.