Privacy leakage on dnns: A survey of model inversion attacks and defenses H Fang, Y Qiu, H Yu, W Yu, J Kong, B Chong, B Chen, X Wang, ST Xia, ... arXiv preprint arXiv:2402.04013, 2024 | 21 | 2024 |
A closer look at gan priors: Exploiting intermediate features for enhanced model inversion attacks Y Qiu, H Fang, H Yu, B Chen, MK Qiu, ST Xia European Conference on Computer Vision, 109-126, 2024 | 7 | 2024 |
Mibench: A comprehensive benchmark for model inversion attack and defense Y Qiu, H Yu, H Fang, W Yu, B Chen, X Wang, ST Xia, K Xu arXiv preprint arXiv:2410.05159, 2024 | 5 | 2024 |
Calor: Towards comprehensive model inversion defense H Yu, Y Qiu, H Fang, B Chen, S Yu, B Wang, ST Xia, K Xu arXiv preprint arXiv:2410.05814, 2024 | 2 | 2024 |
Retrievals Can Be Detrimental: A Contrastive Backdoor Attack Paradigm on Retrieval-Augmented Diffusion Models H Fang, X Sui, H Yu, J Kong, S Yu, B Chen, H Wu, ST Xia arXiv preprint arXiv:2501.13340, 2025 | | 2025 |