1. GenAttack
2. Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms
3. Giuseppe Ateniese , Giovanni Felici , Luigi Mancini , Angelo Spognardi , Antonio Villani , and Domenico Vitali . 2013 . Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers . International Journal of Security and Networks , Vol. 10 (06 2013). https://doi.org/10.1504/IJSN.2015.071829 10.1504/IJSN.2015.071829 Giuseppe Ateniese, Giovanni Felici, Luigi Mancini, Angelo Spognardi, Antonio Villani, and Domenico Vitali. 2013. Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers. International Journal of Security and Networks, Vol. 10 (06 2013). https://doi.org/10.1504/IJSN.2015.071829
4. Sergul Aydore , William Brown , Michael Kearns , Krishnaram Kenthapadi , Luca Melis , Aaron Roth , and Ankit Siva . 2021. Differentially private query release through adaptive projection. arXiv preprint arXiv:2103.06641 ( 2021 ). Sergul Aydore, William Brown, Michael Kearns, Krishnaram Kenthapadi, Luca Melis, Aaron Roth, and Ankit Siva. 2021. Differentially private query release through adaptive projection. arXiv preprint arXiv:2103.06641 (2021).
5. Borja Balle , Giovanni Cherubin , and Jamie Hayes . 2022 . Reconstructing Training Data with Informed Adversaries. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 1556--1556 . Borja Balle, Giovanni Cherubin, and Jamie Hayes. 2022. Reconstructing Training Data with Informed Adversaries. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 1556--1556.