Login / Signup

Transferable Embedding Inversion Attack: Uncovering Privacy Risks in Text Embeddings without Model Queries.

Yu-Hsiang HuangYu-Che TsaiHsiang HsiaoHong-Yi LinShou-De Lin
Published in: CoRR (2024)
Keyphrases
  • probabilistic model
  • response time
  • intrusion detection
  • computational model
  • vector space
  • databases
  • information retrieval
  • objective function
  • feature space
  • data sources