A survey of privacy attacks in machine learning

M Rigaki, S Garcia - ACM Computing Surveys, 2023 - dl.acm.org
As machine learning becomes more widely used, the need to study its implications in
security and privacy becomes more urgent. Although the body of work in privacy has been …

The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

The secret revealer: Generative model-inversion attacks against deep neural networks

Y Zhang, R Jia, H Pei, W Wang… - Proceedings of the …, 2020 - openaccess.thecvf.com
This paper studies model-inversion attacks, in which the access to a model is abused to infer
information about the training data. Since its first introduction by [??], such attacks have …

Variational model inversion attacks

KC Wang, Y Fu, K Li, A Khisti… - Advances in Neural …, 2021 - proceedings.neurips.cc
Given the ubiquity of deep neural networks, it is important that these models do not reveal
information about sensitive data that they have been trained on. In model inversion attacks …

A survey on trustworthy recommender systems

Y Ge, S Liu, Z Fu, J Tan, Z Li, S Xu, Y Li, Y Xian… - ACM Transactions on …, 2024 - dl.acm.org
Recommender systems (RS), serving at the forefront of Human-centered AI, are widely
deployed in almost every corner of the web and facilitate the human decision-making …

Neural network inversion in adversarial setting via background knowledge alignment

Z Yang, J Zhang, EC Chang, Z Liang - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
The wide application of deep learning technique has raised new security concerns about the
training data and test data. In this work, we investigate the model inversion problem under …

Machine learning security: Threats, countermeasures, and evaluations

M Xue, C Yuan, H Wu, Y Zhang, W Liu - IEEE Access, 2020 - ieeexplore.ieee.org
Machine learning has been pervasively used in a wide range of applications due to its
technical breakthroughs in recent years. It has demonstrated significant success in dealing …

Sok: Model inversion attack landscape: Taxonomy, challenges, and future roadmap

SV Dibbo - 2023 IEEE 36th Computer Security Foundations …, 2023 - ieeexplore.ieee.org
A crucial module of the widely applied machine learning (ML) model is the model training
phase, which involves large-scale training data, often including sensitive private data. ML …

Label-only model inversion attacks: Attack with the least information

T Zhu, D Ye, S Zhou, B Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In a model inversion attack, an adversary attempts to reconstruct the training data records of
a target model using only the model's output. In launching a contemporary model inversion …

Can segmentation models be trained with fully synthetically generated data?

V Fernandez, WHL Pinaya, P Borges… - … Workshop on Simulation …, 2022 - Springer
In order to achieve good performance and generalisability, medical image segmentation
models should be trained on sizeable datasets with sufficient variability. Due to ethics and …