Paper
Publication
Reconstructing Training Data with Informed Adversaries: Attacks and Mitigations