Sign in

l-Leaks: Membership Inference Attacks with Logits.

Shuhao LiYajie WangYuanzhang LiYu-an Tan
Published in: CoRR (2022)
Keyphrases
  • information flow
  • leak detection
  • automatic identification
  • fuzzy membership
  • data sets
  • high quality
  • private information