Investigating Privacy Leakage in Dimensionality Reduction Methods via Reconstruction Attack

Open in new window