Sign in

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures.

Matt FredriksonSomesh JhaThomas Ristenpart
Published in: CCS (2015)
Keyphrases
  • countermeasures
  • prior knowledge
  • probabilistic model
  • database
  • computer systems
  • image reconstruction
  • information security
  • computer security
  • java card