Membership inference attacks on machine learning: A survey
Machine learning (ML) models have been widely applied to various applications, including
image classification, text generation, audio recognition, and graph data analysis. However …
image classification, text generation, audio recognition, and graph data analysis. However …
Defenses to membership inference attacks: A survey
Machine learning (ML) has gained widespread adoption in a variety of fields, including
computer vision and natural language processing. However, ML models are vulnerable to …
computer vision and natural language processing. However, ML models are vulnerable to …
Selective and collaborative influence function for efficient recommendation unlearning
Recent regulations concerning the Right to be Forgotten have greatly influenced the
operation of recommender systems, because users now have the right to withdraw their …
operation of recommender systems, because users now have the right to withdraw their …
Membership inference attacks against machine learning models via prediction sensitivity
Machine learning (ML) has achieved huge success in recent years, but is also vulnerable to
various attacks. In this article, we concentrate on membership inference attacks and propose …
various attacks. In this article, we concentrate on membership inference attacks and propose …
A survey on privacy in graph neural networks: Attacks, preservation, and applications
Graph Neural Networks (GNNs) have gained significant attention owing to their ability to
handle graph-structured data and the improvement in practical applications. However, many …
handle graph-structured data and the improvement in practical applications. However, many …
Gradient-leaks: Enabling black-box membership inference attacks against machine learning models
Machine Learning (ML) techniques have been applied to many real-world applications to
perform a wide range of tasks. In practice, ML models are typically deployed as the black …
perform a wide range of tasks. In practice, ML models are typically deployed as the black …
Membership inference attacks against deep learning models via logits distribution
Deep Learning (DL) techniques have gained significant importance in the recent past due to
their vast applications. However, DL is still prone to several attacks, such as the Membership …
their vast applications. However, DL is still prone to several attacks, such as the Membership …
Recommendation unlearning via matrix correction
Recommender systems are important for providing personalized services to users, but the
vast amount of collected user data has raised concerns about privacy (eg, sensitive data) …
vast amount of collected user data has raised concerns about privacy (eg, sensitive data) …
A comprehensive analysis of information leakage in deep transfer learning
Transfer learning is widely used for transferring knowledge from a source domain to the
target domain where the labeled data is scarce. Recently, deep transfer learning has …
target domain where the labeled data is scarce. Recently, deep transfer learning has …
Robust SGLD algorithm for solving non-convex distributionally robust optimisation problems
In this paper we develop a Stochastic Gradient Langevin Dynamics (SGLD) algorithm
tailored for solving a certain class of non-convex distributionally robust optimisation …
tailored for solving a certain class of non-convex distributionally robust optimisation …