Login / Signup
Transferable Embedding Inversion Attack: Uncovering Privacy Risks in Text Embeddings without Model Queries.
Yu-Hsiang Huang
Yu-Che Tsai
Hsiang Hsiao
Hong-Yi Lin
Shou-De Lin
Published in:
CoRR (2024)
Keyphrases
</>
probabilistic model
response time
intrusion detection
computational model
vector space
databases
information retrieval
objective function
feature space
data sources