Login / Signup
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures.
Matt Fredrikson
Somesh Jha
Thomas Ristenpart
Published in:
CCS (2015)
Keyphrases
</>
countermeasures
prior knowledge
probabilistic model
database
computer systems
image reconstruction
information security
computer security
java card