Model Inversion

Model Inversion Attacks Meet Cryptographic Fuzzy Extractors

Authors: Mallika Prabhakar, Louise Xu, Prateek Saxena | Published: 2025-10-29
Membership Inference
Model Inversion
Defense Method

Explainable and Resilient ML-Based Physical-Layer Attack Detectors

Authors: Aleksandra Knapińska, Marija Furdek | Published: 2025-09-30
Model Inversion
Model Performance Evaluation
物理層攻撃検出

LLM Watermark Evasion via Bias Inversion

Authors: Jeongyeon Hwang, Sangdon Park, Jungseul Ok | Published: 2025-09-27 | Updated: 2025-10-01
Disabling Safety Mechanisms of LLM
Model Inversion
Statistical Testing

ENSI: Efficient Non-Interactive Secure Inference for Large Language Models

Authors: Zhiyu He, Maojiang Wang, Xinwen Gao, Yuchuan Luo, Lin Liu, Shaojing Fu | Published: 2025-09-11
Algorithm
Model Inversion
Efficiency Evaluation

An Automated, Scalable Machine Learning Model Inversion Assessment Pipeline

Authors: Tyler Shumaker, Jessica Carpenter, David Saranchak, Nathaniel D. Bastian | Published: 2025-09-04
Model Inversion
Model Extraction Attack
Risk Analysis Method

AI Risk-Management Standards Profile for General-Purpose AI (GPAI) and Foundation Models

Authors: Anthony M. Barrett, Jessica Newman, Brandie Nonnecke, Nada Madkour, Dan Hendrycks, Evan R. Murphy, Krystal Jackson, Deepika Raman | Published: 2025-06-30
Model Inversion
Risk Assessment Method
Education and Follow-up

KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs

Authors: Xin Fan Guo, Albert Merono Penuela, Sergio Maffeis, Fabio Pierazzi | Published: 2025-06-24
Model Inversion
攻撃戦略分析
Feature Extraction

Interpretable Anomaly Detection in Encrypted Traffic Using SHAP with Machine Learning Models

Authors: Kalindi Singh, Aayush Kashyap, Aswani Kumar Cherukuri | Published: 2025-05-22
Model Inversion
Anomaly Detection Algorithm
loss of Interpretability

PrivDiffuser: Privacy-Guided Diffusion Model for Data Obfuscation in Sensor Networks

Authors: Xin Yang, Omid Ardakanian | Published: 2024-12-19 | Updated: 2025-08-05
Model Inversion
Differential Privacy
Watermark

Language Model Inversion

Authors: John X. Morris, Wenting Zhao, Justin T. Chiu, Vitaly Shmatikov, Alexander M. Rush | Published: 2023-11-22
Prompt leaking
Model Inversion
Model Evaluation