no code implementations • 16 Dec 2021 • Ana-Maria Creţu, Florent Guépin, Yves-Alexandre de Montjoye
Second, we propose a model-based attack, showing how an attacker can exploit black-box access to the model to infer the correlations using shadow models trained on synthetic datasets.