Skip to main content
. Author manuscript; available in PMC: 2025 May 21.
Published in final edited form as: Conf Comput Commun Secur. 2024 Dec 9;2024:3511–3524. doi: 10.1145/3658644.3690279

Table 7:

Comparison with related works that manipulate integrity for privacy risk amplification. Manipulate: ○/ ◐ / Inline graphic represents manipulating model parameters/model/training data; PEFT: ○/ ◐ / Inline graphic represents no/evaluated/evaluated and investigated. Case II: whether considering comparison cases when the fine-tuner applies early stopping. Stealthy: whether considering stealthiness control.

Method Attacker’s Goal Victim’s Task Manipulate Case II Stealthy PEFT
[7] MIA Discriminative graphic file with name nihms-2081474-t0003.jpg N/A yes
[29] Property inference Discriminative graphic file with name nihms-2081474-t0004.jpg N/A no
[44] MIA+Extraction Generative graphic file with name nihms-2081474-t0005.jpg N/A no
[43] Property inference Discriminative N/A yes
[11] Reconstruction Discriminative N/A no
[47] MIA Generative no yes
Ours MIA+Extraction Generative yes yes graphic file with name nihms-2081474-t0006.jpg