SOTAVerified

Reconstruction Attack

Facial reconstruction attack of facial manipulation models such as: Face swapping models, anonymization models, etc.

Papers

Showing 2650 of 68 papers

TitleStatusHype
Bayes' capacity as a measure for reconstruction attacks in federated learning0
Bounding Reconstruction Attack Success of Adversaries Without Data Priors0
Bounding Training Data Reconstruction in DP-SGD0
Byzantine Outside, Curious Inside: Reconstructing Data Through Malicious Updates0
The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against "Truly Anonymous" Synthetic Datasets0
On the Reconstruction of Face Images from Deep Face Templates0
Privacy-Preserving Medical Image Classification through Deep Learning and Matrix Decomposition0
Privacy Safe Representation Learning via Frequency Filtering Encoder0
PrivMVMF: Privacy-Preserving Multi-View Matrix Factorization for Recommender Systems0
Reconstruction Attack on Instance Encoding for Language Understanding0
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning0
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense0
SAPAG: A Self-Adaptive Privacy Attack From Gradients0
Supervised and Unsupervised Alignments for Spoofing Behavioral Biometrics0
Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis0
UIFV: Data Reconstruction Attack in Vertical Federated Learning0
Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information Hiding0
Visual Privacy Auditing with Diffusion Models0
Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack0
VVRec: Reconstruction Attacks on DL-based Volumetric Video Upstreaming via Latent Diffusion Model with Gamma Distribution0
Input Reconstruction Attack against Vertical Federated Large Language Models0
Is Diffusion Model Safe? Severe Data Leakage via Gradient-Guided Diffusion Model0
LATTEO: A Framework to Support Learning Asynchronously Tempered with Trusted Execution and Obfuscation0
Local Differential Privacy is Not Enough: A Sample Reconstruction Attack against Federated Learning with Local Differential Privacy0
Local Model Reconstruction Attacks in Federated Learning and their Uses0
Show:102550
← PrevPage 2 of 3Next →

No leaderboard results yet.