Learning with Differential Privacy: Stability, Learnability and the Sufficiency and Necessity of ERM Principle Authors: Yu-Xiang Wang, Jing Lei, Stephen E. Fienberg | Published: 2015-02-23 | Updated: 2016-04-27 Privacy Enhancing Technology学習可能性Differential Privacy 2015.02.23 2026.05.01 Literature Database
PowerSpy: Location Tracking using Mobile Device Power Analysis Authors: Yan Michalevsky, Gabi Nakibly, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh | Published: 2015-02-11 | Updated: 2015-08-18 Energy EfficiencyPrivacy Enhancing Technology位置情報推測 2015.02.11 2026.05.01 Literature Database
Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices Authors: Jihun Hamm, Adam Champion, Guoxing Chen, Mikhail Belkin, Dong Xuan | Published: 2015-01-11 Simulation EnvironmentPrivacy Enhancing TechnologyDifferential Privacy 2015.01.11 2026.05.01 Literature Database
Differential Privacy and Machine Learning: a Survey and Review Authors: Zhanglong Ji, Zachary C. Lipton, Charles Elkan | Published: 2014-12-24 Privacy Enhancing TechnologyDifferential PrivacyDimensionality Reduction Method 2014.12.24 2026.05.01 Literature Database
Towards Deep Neural Network Architectures Robust to Adversarial Examples Authors: Shixiang Gu, Luca Rigazio | Published: 2014-12-11 | Updated: 2015-04-09 Certified RobustnessRobustnessDeep Learning Technology 2014.12.11 2026.05.01 Literature Database
Understanding Deep Image Representations by Inverting Them Authors: Aravindh Mahendran, Andrea Vedaldi | Published: 2014-11-26 XAI (Explainable AI)Model InversionDeep Learning Method 2014.11.26 2026.05.01 Literature Database
Private Empirical Risk Minimization Beyond the Worst Case: The Effect of the Constraint Set Geometry Authors: Kunal Talwar, Abhradeep Thakurta, Li Zhang | Published: 2014-11-20 | Updated: 2016-11-20 Privacy Enhancing TechnologyPrivacy Loss Analysisフランク・ウォルフアルゴリズム 2014.11.20 2026.05.01 Literature Database
CONDENSER: A Graph-Based Approachfor Detecting Botnets Authors: Pedro Camelo, Joao Moura, Ludwig Krippahl | Published: 2014-10-31 Clustering methodsNetwork Packet ManagementCommunication Efficiency 2014.10.31 2026.05.01 Literature Database
Anomaly Detection Framework Using Rule Extraction for Efficient Intrusion Detection Authors: Antti Juvonen, Tuomo Sipola | Published: 2014-10-28 Clustering methodsData PreprocessingFramework Support 2014.10.28 2026.05.01 Literature Database
Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination Authors: Amit Datta, Michael Carl Tschantz, Anupam Datta | Published: 2014-08-27 | Updated: 2015-03-17 Privacy TechniqueExperimental ValidationAd Blocking System 2014.08.27 2026.05.01 Literature Database