no code implementations • 6 May 2024 • Jin Qian, Kaimin Wei, Yongdong Wu, Jilian Zhang, Jipeng Chen, Huan Bao
Recent work has demonstrated that gradient inversion attacks can exploit the gradients of FL to recreate the original user data, posing significant privacy risks.
no code implementations • 22 Apr 2024 • Huan Bao, Kaimin Wei, Yongdong Wu, Jin Qian, Robert H. Deng
Then, it randomly chooses latent codes from the latent probability distribution for recovering the private data.
no code implementations • 12 Aug 2021 • Jinpeng Chen, Haiyang Li, Xudong Zhang, Fan Zhang, Senzhang Wang, Kaimin Wei, Jiaqi Ji
The current studies generally learn user preferences according to the transitions of items in the user's session sequence.