Login / Signup
Full Database Reconstruction: Leakage-Abuse Attacks Based on Expected Distributions.
Ruizhong Du
Xijie She
Mingyue Li
Ziyuan Wang
Published in:
ICIC (9) (2024)
Keyphrases
</>
database
databases
database systems
database management systems
relational databases
three dimensional
database applications
data model
high resolution
malicious attacks
data structure
sparse representation
database design
image reconstruction
database schema
reconstruction error
reconstruction method