Picture for Dayong Ye

Dayong Ye

Minhui

Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning

Add code
Jan 28, 2025
Viaarxiv icon

Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI

Add code
Jan 28, 2025
Figure 1 for Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI
Figure 2 for Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI
Figure 3 for Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI
Figure 4 for Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI
Viaarxiv icon

When Machine Unlearning Meets Retrieval-Augmented Generation (RAG): Keep Secret or Forget Knowledge?

Add code
Oct 20, 2024
Viaarxiv icon

Reinforcement Unlearning

Add code
Dec 26, 2023
Figure 1 for Reinforcement Unlearning
Figure 2 for Reinforcement Unlearning
Figure 3 for Reinforcement Unlearning
Figure 4 for Reinforcement Unlearning
Viaarxiv icon

Boosting Model Inversion Attacks with Adversarial Examples

Add code
Jun 24, 2023
Figure 1 for Boosting Model Inversion Attacks with Adversarial Examples
Figure 2 for Boosting Model Inversion Attacks with Adversarial Examples
Figure 3 for Boosting Model Inversion Attacks with Adversarial Examples
Figure 4 for Boosting Model Inversion Attacks with Adversarial Examples
Viaarxiv icon

New Challenges in Reinforcement Learning: A Survey of Security and Privacy

Add code
Dec 31, 2022
Viaarxiv icon

One Parameter Defense -- Defending against Data Inference Attacks via Differential Privacy

Add code
Mar 13, 2022
Viaarxiv icon

Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It

Add code
Mar 13, 2022
Figure 1 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 2 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 3 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 4 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Viaarxiv icon

Label-only Model Inversion Attack: The Attack that Requires the Least Information

Add code
Mar 13, 2022
Figure 1 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Figure 2 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Figure 3 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Figure 4 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Viaarxiv icon

DP-Image: Differential Privacy for Image Data in Feature Space

Add code
Mar 12, 2021
Figure 1 for DP-Image: Differential Privacy for Image Data in Feature Space
Figure 2 for DP-Image: Differential Privacy for Image Data in Feature Space
Figure 3 for DP-Image: Differential Privacy for Image Data in Feature Space
Figure 4 for DP-Image: Differential Privacy for Image Data in Feature Space
Viaarxiv icon