Login / Signup

Analysis and Utilization of Hidden Information in Model Inversion Attacks.

Zeping ZhangXiaowen WangJie HuangShuaishuai Zhang
Published in: IEEE Trans. Inf. Forensics Secur. (2023)
Keyphrases
  • high level
  • multiscale
  • computational complexity