Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,237,241 papers from all fields of science
Search
Sign In
Create Free Account
Inference attack
An Inference Attack is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database. A…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Broader (2)
Computer security
Data security
Data mining
Information
Information security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Label-Leaks: Membership Inference Attack with Label
Zheng Li
,
Yang Zhang
arXiv.org
2020
Corpus ID: 220871217
Machine learning (ML) has made tremendous progress during the past decade and ML models have been deployed in many real-world…
Expand
2020
2020
Image and Attribute Based Convolutional Neural Network Inference Attacks in Social Networks
Bo Mei
,
Yinhao Xiao
,
Ruinian Li
,
Hong Li
,
Xiuzhen Cheng
,
Yunchuan Sun
IEEE Transactions on Network Science and…
2020
Corpus ID: 125907278
In modern society, social networks play an important role for online users. However, one unignorable problem behind the booming…
Expand
Highly Cited
2019
Highly Cited
2019
Demystifying Membership Inference Attacks in Machine Learning as a Service
Stacey Truex
,
Ling Liu
,
M. E. Gursoy
,
Lei Yu
,
Wenqi Wei
IEEE Transactions on Services Computing
2019
Corpus ID: 86836429
Membership inference attacks seek to infer membership of individual training instances of a model to which an adversary has black…
Expand
Highly Cited
2018
Highly Cited
2018
Inference Attacks Against Collaborative Learning
Luca Melis
,
Congzheng Song
,
Emiliano De Cristofaro
,
Vitaly Shmatikov
arXiv.org
2018
Corpus ID: 195347144
Collaborative machine learning and related techniques such as distributed and federated learning allow multiple participants…
Expand
2017
2017
Side-Channel Inference Attacks on Mobile Keypads Using Smartwatches
Anindya Maiti
,
Murtuza Jadliwala
,
Jibo He
,
Igor Bilogrevic
IEEE Transactions on Mobile Computing
2017
Corpus ID: 9468957
Smartwatches enable many novel applications and are fast gaining popularity. However, the presence of a diverse set of on-board…
Expand
Highly Cited
2017
Highly Cited
2017
Leakage-Abuse Attacks against Order-Revealing Encryption
Paul Grubbs
,
Kevin Sekniqi
,
Vincent Bindschaedler
,
Muhammad Naveed
,
T. Ristenpart
IEEE Symposium on Security and Privacy
2017
Corpus ID: 18085613
Order-preserving encryption and its generalization order-revealing encryption (OPE/ORE) allow sorting, performing range queries…
Expand
Highly Cited
2016
Highly Cited
2016
Minimax Filter: Learning to Preserve Privacy from Inference Attacks
Jihun Hamm
Journal of machine learning research
2016
Corpus ID: 99500
Preserving privacy of continuous and/or high-dimensional data such as images, videos and audios, can be challenging with…
Expand
Highly Cited
2016
Highly Cited
2016
Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms
Anindya Maiti
,
Oscar Armbruster
,
Murtuza Jadliwala
,
Jibo He
ACM Asia Conference on Computer and…
2016
Corpus ID: 264201955
Wearable devices, such as smartwatches, are furnished with state-of-the-art sensors that enable a range of context-aware…
Expand
Highly Cited
2014
Highly Cited
2014
Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks
Qi Alfred Chen
,
Zhiyun Qian
,
Z. Morley Mao
USENIX Security Symposium
2014
Corpus ID: 7475851
The security of smartphone GUI frameworks remains an important yet under-scrutinized topic. In this paper, we report that on the…
Expand
Highly Cited
2013
Highly Cited
2013
De-anonymization Attack on Geolocated Data
S. Gambs
,
M. Killijian
,
Miguel Núñez del Prado Cortez
12th IEEE International Conference on Trust…
2013
Corpus ID: 14703689
With the advent of GPS-equipped devices, a massive amount of location data is being collected, raising the issue of the privacy…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required