SOTAVerified

Reconstruction Attack

Facial reconstruction attack of facial manipulation models such as: Face swapping models, anonymization models, etc.

Papers

Showing 2130 of 68 papers

TitleStatusHype
Visual Privacy Auditing with Diffusion Models0
Trained Random Forests Completely Reveal your DatasetCode1
Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and ReconstructionCode2
MIP: CLIP-based Image Reconstruction from PEFT Gradients0
Bounding Reconstruction Attack Success of Adversaries Without Data Priors0
Privacy Attacks in Decentralized LearningCode0
Data Reconstruction Attacks and Defenses: A Systematic Evaluation0
Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT ModelsCode1
The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against "Truly Anonymous" Synthetic Datasets0
Input Reconstruction Attack against Vertical Federated Large Language Models0
Show:102550
← PrevPage 3 of 7Next →

No leaderboard results yet.