SOTAVerified

Reconstruction Attack

Facial reconstruction attack of facial manipulation models such as: Face swapping models, anonymization models, etc.

Papers

Showing 2650 of 68 papers

TitleStatusHype
UIFV: Data Reconstruction Attack in Vertical Federated Learning0
Is Diffusion Model Safe? Severe Data Leakage via Gradient-Guided Diffusion Model0
URVFL: Undetectable Data Reconstruction Attack on Vertical Federated LearningCode0
Visual Privacy Auditing with Diffusion Models0
MIP: CLIP-based Image Reconstruction from PEFT Gradients0
Bounding Reconstruction Attack Success of Adversaries Without Data Priors0
Privacy Attacks in Decentralized LearningCode0
Data Reconstruction Attacks and Defenses: A Systematic Evaluation0
The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against "Truly Anonymous" Synthetic Datasets0
Input Reconstruction Attack against Vertical Federated Large Language Models0
An Examination of the Alleged Privacy Threats of Confidence-Ranked Reconstruction of Census MicrodataCode0
RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data ManipulationCode0
FIVA: Facial Image and Video Anonymization and Anonymization Defense0
Privacy-Preserving Medical Image Classification through Deep Learning and Matrix Decomposition0
Approximate and Weighted Data Reconstruction Attack in Federated Learning0
Deconstructing Classifiers: Towards A Data Reconstruction Attack Against Text Classification Models0
Does Black-box Attribute Inference Attacks on Graph Neural Networks Constitute Privacy Risk?0
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense0
LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model ManipulationCode0
Bounding Training Data Reconstruction in DP-SGD0
Measuring the Privacy Leakage via Graph Reconstruction Attacks on Simplicial Neural Networks (Student Abstract)0
Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset DistillationCode0
Vicious Classifiers: Assessing Inference-time Data Reconstruction Risk in Edge ComputingCode0
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning0
Local Model Reconstruction Attacks in Federated Learning and their Uses0
Show:102550
← PrevPage 2 of 3Next →

No leaderboard results yet.