SOTAVerified

Reconstruction Attack

Facial reconstruction attack of facial manipulation models such as: Face swapping models, anonymization models, etc.

Papers

Showing 2650 of 68 papers

TitleStatusHype
Privacy Attacks in Decentralized LearningCode0
Data Reconstruction Attacks and Defenses: A Systematic Evaluation0
Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT ModelsCode1
The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against "Truly Anonymous" Synthetic Datasets0
Input Reconstruction Attack against Vertical Federated Large Language Models0
An Examination of the Alleged Privacy Threats of Confidence-Ranked Reconstruction of Census MicrodataCode0
RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data ManipulationCode0
FIVA: Facial Image and Video Anonymization and Anonymization Defense0
Privacy-Preserving Medical Image Classification through Deep Learning and Matrix Decomposition0
Approximate and Weighted Data Reconstruction Attack in Federated Learning0
Deconstructing Classifiers: Towards A Data Reconstruction Attack Against Text Classification Models0
On Strengthening and Defending Graph Reconstruction Attack with Markov Chain ApproximationCode1
Does Black-box Attribute Inference Attacks on Graph Neural Networks Constitute Privacy Risk?0
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense0
LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model ManipulationCode0
Bounding Training Data Reconstruction in DP-SGD0
Measuring the Privacy Leakage via Graph Reconstruction Attacks on Simplicial Neural Networks (Student Abstract)0
Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset DistillationCode0
Vicious Classifiers: Assessing Inference-time Data Reconstruction Risk in Edge ComputingCode0
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning0
Confidence-Ranked Reconstruction of Census Microdata from Published StatisticsCode1
Local Model Reconstruction Attacks in Federated Learning and their Uses0
Feature Reconstruction Attacks and Countermeasures of DNN training in Vertical Federated LearningCode0
TabLeak: Tabular Data Leakage in Federated LearningCode1
PrivMVMF: Privacy-Preserving Multi-View Matrix Factorization for Recommender Systems0
Show:102550
← PrevPage 2 of 3Next →

No leaderboard results yet.