Personalization Improves Privacy-Accuracy Tradeoffs in Federated Learning Authors: Alberto Bietti, Chen-Yu Wei, Miroslav Dudík, John Langford, Zhiwei Steven Wu | Published: 2022-02-10 | Updated: 2022-07-15 2022.02.10 2025.05.28 Literature Database
Case-based reasoning for rare events prediction on strategic sites Authors: Vincent Vidal, Marie-Caroline Corbineau, Tugdual Ceillier | Published: 2022-02-10 2022.02.10 2025.05.28 Literature Database
PrivFair: a Library for Privacy-Preserving Fairness Auditing Authors: Sikha Pentyala, David Melanson, Martine De Cock, Golnoosh Farnadi | Published: 2022-02-08 | Updated: 2022-05-23 2022.02.08 2025.05.28 Literature Database
Bilevel Optimization with a Lower-level Contraction: Optimal Sample Complexity without Warm-start Authors: Riccardo Grazzi, Massimiliano Pontil, Saverio Salzo | Published: 2022-02-07 | Updated: 2023-11-16 2022.02.07 2025.05.28 Literature Database
Membership Inference Attacks and Defenses in Neural Network Pruning Authors: Xiaoyong Yuan, Lan Zhang | Published: 2022-02-07 | Updated: 2022-08-03 2022.02.07 2025.05.28 Literature Database
Efficient Privacy Preserving Logistic Regression for Horizontally Distributed Data Authors: Guanhong Miao | Published: 2022-02-05 | Updated: 2022-07-20 2022.02.05 2025.05.28 Literature Database
Improved Certified Defenses against Data Poisoning with (Deterministic) Finite Aggregation Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-02-05 | Updated: 2022-07-14 2022.02.05 2025.05.28 Literature Database
Training Differentially Private Models with Secure Multiparty Computation Authors: Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson Nascimento, Martine De Cock | Published: 2022-02-05 | Updated: 2022-09-01 2022.02.05 2025.05.28 Literature Database
Linear Model Against Malicious Adversaries with Local Differential Privacy Authors: Guanhong Miao, A. Adam Ding, Samuel S. Wu | Published: 2022-02-05 | Updated: 2022-06-29 2022.02.05 2025.05.28 Literature Database
Pixle: a fast and effective black-box attack based on rearranging pixels Authors: Jary Pomponi, Simone Scardapane, Aurelio Uncini | Published: 2022-02-04 2022.02.04 2025.05.28 Literature Database