SOTAVerified

Reconstruction Attack

Facial reconstruction attack of facial manipulation models such as: Face swapping models, anonymization models, etc.

Papers

Showing 4150 of 68 papers

TitleStatusHype
Bounding Training Data Reconstruction in DP-SGD0
Measuring the Privacy Leakage via Graph Reconstruction Attacks on Simplicial Neural Networks (Student Abstract)0
Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset Distillation0
Vicious Classifiers: Assessing Inference-time Data Reconstruction Risk in Edge ComputingCode0
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning0
Confidence-Ranked Reconstruction of Census Microdata from Published StatisticsCode1
Local Model Reconstruction Attacks in Federated Learning and their Uses0
Feature Reconstruction Attacks and Countermeasures of DNN training in Vertical Federated LearningCode0
TabLeak: Tabular Data Leakage in Federated LearningCode1
PrivMVMF: Privacy-Preserving Multi-View Matrix Factorization for Recommender Systems0
Show:102550
← PrevPage 5 of 7Next →

No leaderboard results yet.