1

Label-only model inversion attacks via boundary repulsion
Adversarial unlearning of backdoors via implicit hypergradient
Knowledge-enriched distributional model inversion attacks
Learning to Refit for Convex Learning Problems