ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2010.13356
  4. Cited By
Exploring the Security Boundary of Data Reconstruction via Neuron
  Exclusivity Analysis

Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis

26 October 2020
Xudong Pan
Mi Zhang
Yifan Yan
Jiaming Zhu
Zhemin Yang
    AAML
ArXivPDFHTML

Papers citing "Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis"

3 / 3 papers shown
Title
Quantifying Privacy Leakage in Split Inference via Fisher-Approximated Shannon Information Analysis
Quantifying Privacy Leakage in Split Inference via Fisher-Approximated Shannon Information Analysis
Ruijun Deng
Zhihui Lu
Qiang Duan
FedML
46
0
0
14 Apr 2025
Dropout is NOT All You Need to Prevent Gradient Leakage
Dropout is NOT All You Need to Prevent Gradient Leakage
Daniel Scheliga
Patrick Mäder
M. Seeland
FedML
42
12
0
12 Aug 2022
Model-Reuse Attacks on Deep Learning Systems
Model-Reuse Attacks on Deep Learning Systems
Yujie Ji
Xinyang Zhang
S. Ji
Xiapu Luo
Ting Wang
SILM
AAML
134
186
0
02 Dec 2018
1