Sign in

GI-PIP: Do We Require Impractical Auxiliary Dataset for Gradient Inversion Attacks?

Yu SunGaojian XiongXianxun YaoKailang MaJian Cui
Published in: CoRR (2024)
Keyphrases
  • video sequences
  • countermeasures
  • information systems
  • multiscale
  • benchmark datasets
  • image reconstruction
  • information security
  • security mechanisms
  • gradient method
  • java card