SOTAVerified

Reconstruction Attack

Facial reconstruction attack of facial manipulation models such as: Face swapping models, anonymization models, etc.

Papers

Showing 5160 of 68 papers

TitleStatusHype
Measuring the Privacy Leakage via Graph Reconstruction Attacks on Simplicial Neural Networks (Student Abstract)0
MIP: CLIP-based Image Reconstruction from PEFT Gradients0
How Private Is Your RL Policy? An Inverse RL Based Analysis FrameworkCode0
Feature Reconstruction Attacks and Countermeasures of DNN training in Vertical Federated LearningCode0
LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model ManipulationCode0
Investigating Privacy Leakage in Dimensionality Reduction Methods via Reconstruction AttackCode0
Vicious Classifiers: Assessing Inference-time Data Reconstruction Risk in Edge ComputingCode0
When the Curious Abandon Honesty: Federated Learning Is Not PrivateCode0
URVFL: Undetectable Data Reconstruction Attack on Vertical Federated LearningCode0
RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data ManipulationCode0
Show:102550
← PrevPage 6 of 7Next →

No leaderboard results yet.