2. Privacy Papers 2.1 Training Data 2.1.1 Data Recovery 2.1.2 Membership Inference Attack 2.1.3 Information Leakage in Distributed ML System 2.1.4 Information Leakage in Embedding 2.1.5 Graph Leakage 2.1.6 Unlearning 2.1.7 Attribute Inference Attack 2.1.7 Property Inference Attack 2.2 Model ...
https://www.ndss-symposium.org/ndss2024/accepted-papers/ PS:尽管漏洞挖掘和对抗样本是各大安全顶会的大方向,但作者还在从零学习中,因此相关论文暂未纳入,后续学到一定程序会进行总结和分享,部分涉及新型漏洞攻击的文章会囊括,望大家见谅。 文章目录: 1.Architecting Trigger-Action Platforms for Security, Perform...