UnPII: Unlearning Personally Identifiable Information with Quantifiable Exposure Risk Authors: Intae Jeon, Yujeong Kwon, Hyungjoon Koo | Published: 2026-01-05 Data Selection StrategyPrivacy Enhancing TechnologyModel Inversion 2026.01.05 2026.01.07 Literature Database
Model Inversion Attacks Meet Cryptographic Fuzzy Extractors Authors: Mallika Prabhakar, Louise Xu, Prateek Saxena | Published: 2025-10-29 Membership InferenceModel InversionDefense Method 2025.10.29 2025.10.31 Literature Database
Explainable and Resilient ML-Based Physical-Layer Attack Detectors Authors: Aleksandra Knapińska, Marija Furdek | Published: 2025-09-30 Model InversionModel Performance Evaluation物理層攻撃検出 2025.09.30 2025.10.02 Literature Database
LLM Watermark Evasion via Bias Inversion Authors: Jeongyeon Hwang, Sangdon Park, Jungseul Ok | Published: 2025-09-27 | Updated: 2025-10-01 Disabling Safety Mechanisms of LLMModel InversionStatistical Testing 2025.09.27 2025.10.03 Literature Database
ENSI: Efficient Non-Interactive Secure Inference for Large Language Models Authors: Zhiyu He, Maojiang Wang, Xinwen Gao, Yuchuan Luo, Lin Liu, Shaojing Fu | Published: 2025-09-11 AlgorithmModel InversionEfficiency Evaluation 2025.09.11 2025.09.13 Literature Database
An Automated, Scalable Machine Learning Model Inversion Assessment Pipeline Authors: Tyler Shumaker, Jessica Carpenter, David Saranchak, Nathaniel D. Bastian | Published: 2025-09-04 Model InversionModel Extraction AttackRisk Analysis Method 2025.09.04 2025.09.06 Literature Database
AI Risk-Management Standards Profile for General-Purpose AI (GPAI) and Foundation Models Authors: Anthony M. Barrett, Jessica Newman, Brandie Nonnecke, Nada Madkour, Dan Hendrycks, Evan R. Murphy, Krystal Jackson, Deepika Raman | Published: 2025-06-30 Model InversionRisk Assessment MethodEducation and Follow-up 2025.06.30 2025.07.02 Literature Database
KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs Authors: Xin Fan Guo, Albert Merono Penuela, Sergio Maffeis, Fabio Pierazzi | Published: 2025-06-24 Model Inversion攻撃戦略分析Feature Extraction 2025.06.24 2025.06.26 Literature Database
Interpretable Anomaly Detection in Encrypted Traffic Using SHAP with Machine Learning Models Authors: Kalindi Singh, Aayush Kashyap, Aswani Kumar Cherukuri | Published: 2025-05-22 Model InversionAnomaly Detection Algorithmloss of Interpretability 2025.05.22 2025.05.28 Literature Database
PrivDiffuser: Privacy-Guided Diffusion Model for Data Obfuscation in Sensor Networks Authors: Xin Yang, Omid Ardakanian | Published: 2024-12-19 | Updated: 2025-08-05 Model InversionDifferential PrivacyWatermark 2024.12.19 2025.08.07 Literature Database