Login / Signup
Transferable Embedding Inversion Attack: Uncovering Privacy Risks in Text Embeddings without Model Queries.
Yu-Hsiang Huang
Yu-Che Tsai
Hsiang Hsiao
Hong-Yi Lin
Shou-De Lin
Published in:
ACL (1) (2024)
Keyphrases
</>
probabilistic model
response time
computational model
database
query processing
mathematical model
vector space
neural network
information retrieval