no code implementations • 12 Apr 2023 • Gioacchino Tangari, Shreesh Keskar, Hassan Jameel Asghar, Dali Kaafar
For the biometric authentication use case, we need to investigate this under adversarial settings where an attacker has access to a feature-space representation but no direct access to the exact original dataset nor the original learned model.
1 code implementation • 17 Feb 2020 • Shakila Mahjabin Tonni, Dinusha Vatsalan, Farhad Farokhi, Dali Kaafar, Zhigang Lu, Gioacchino Tangari
Our results reveal the relationship between MIA accuracy and properties of the dataset and training model in use.