Interpretable Anomaly Detection in Encrypted Traffic Using SHAP with Machine Learning Models Authors: Kalindi Singh, Aayush Kashyap, Aswani Kumar Cherukuri | Published: 2025-05-22 Model InversionAnomaly Detection Algorithmloss of Interpretability 2025.05.22 2025.05.28 Literature Database
Language Model Inversion Authors: John X. Morris, Wenting Zhao, Justin T. Chiu, Vitaly Shmatikov, Alexander M. Rush | Published: 2023-11-22 Prompt leakingModel InversionModel Evaluation 2023.11.22 2025.05.28 Literature Database
Text Embeddings Reveal (Almost) As Much As Text Authors: John X. Morris, Volodymyr Kuleshov, Vitaly Shmatikov, Alexander M. Rush | Published: 2023-10-10 Membership InferenceModel InversionModel Evaluation 2023.10.10 2025.05.28 Literature Database
Inference Attacks Against Graph Neural Networks Authors: Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang | Published: 2021-10-06 Property InferenceMembership InferenceModel Inversion 2021.10.06 2025.05.28 Literature Database
Exploiting Explanations for Model Inversion Attacks Authors: Xuejun Zhao, Wencan Zhang, Xiaokui Xiao, Brian Y. Lim | Published: 2021-04-26 | Updated: 2022-03-14 XAI (Explainable AI)Privacy TechniqueModel Inversion 2021.04.26 2025.05.28 Literature Database
Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack Authors: Hadi Mansourifar, Weidong Shi | Published: 2020-08-23 Model InversionAdversarial Attack MethodsFace Recognition 2020.08.23 2025.05.28 Literature Database
Reducing Risk of Model Inversion Using Privacy-Guided Training Authors: Abigail Goldsteen, Gilad Ezov, Ariel Farkash | Published: 2020-06-29 Privacy LeakageMembership InferenceModel Inversion 2020.06.29 2025.05.28 Literature Database
Stealing Links from Graph Neural Networks Authors: Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang | Published: 2020-05-05 | Updated: 2020-10-05 Model InversionLink Prediction MethodAttack Evaluation 2020.05.05 2025.05.28 Literature Database
Attacking Graph-based Classification via Manipulating the Graph Structure Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2019-03-01 | Updated: 2019-08-13 PoisoningModel InversionAdversarial Graph Classification 2019.03.01 2025.05.28 Literature Database
AutoGAN-based Dimension Reduction for Privacy Preservation Authors: Hung Nguyen, Di Zhuang, Pei-Yuan Wu, Morris Chang | Published: 2019-02-27 | Updated: 2021-07-27 Privacy Protection MethodMulti-Class ClassificationModel Inversion 2019.02.27 2025.05.28 Literature Database