no code implementations • 26 Nov 2023 • Abhishek Sinha, Himanshi Tibrewal, Mansi Gupta, Nikhar Waghela, Shivank Garg
In this attack, adversaries aim to determine whether a particular point was used during the training of a target model.