Literature Database

Ranking Differential Privacy

Authors: Shirong Xu, Will Wei Sun, Guang Cheng | Published: 2023-01-02
Privacy Enhancing Technology
Optimization Methods
Statistical Methods

Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain

Authors: Vesal Ahsani, Ali Rahimi, Mehdi Letafati, Babak Hossein Khalaj | Published: 2023-01-01 | Updated: 2023-01-11
Backdoor Attack
Privacy Enhancing Technology
Blockchain Integration

DPack: Efficiency-Oriented Privacy Budget Scheduling

Authors: Pierre Tholoniat, Kelly Kostopoulou, Mosharaf Chowdhury, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer, Junfeng Yang | Published: 2022-12-26 | Updated: 2024-10-10
Scheduling Method
Privacy Enhancing Technology
Optimization Methods

SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning

Authors: Ahmed Salem, Giovanni Cherubin, David Evans, Boris Köpf, Andrew Paverd, Anshuman Suri, Shruti Tople, Santiago Zanella-Béguelin | Published: 2022-12-21 | Updated: 2023-04-20
Data Privacy Assessment
Privacy Enhancing Technology
Membership Inference

Learned Systems Security

Authors: Roei Schuster, Jin Peng Zhou, Thorsten Eisenhofer, Paul Grubbs, Nicolas Papernot | Published: 2022-12-20 | Updated: 2023-01-10
Backdoor Attack
Privacy Enhancing Technology
Poisoning

Mobile Augmented Reality with Federated Learning in the Metaverse

Authors: Xinyu Zhou, Jun Zhao | Published: 2022-12-16 | Updated: 2023-11-07
Data Collection
Privacy Enhancing Technology
Optimization Methods

Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection

Authors: Benjamin Steenhoek, Hongyang Gao, Wei Le | Published: 2022-12-15 | Updated: 2023-10-01
Software Security
Data Flow Analysis
Program Analysis

Constitutional AI: Harmlessness from AI Feedback

Authors: Yuntao Bai, Saurav Kadavath, Sandipan Kundu, Amanda Askell, Jackson Kernion, Andy Jones, Anna Chen, Anna Goldie, Azalia Mirhoseini, Cameron McKinnon, Carol Chen, Catherine Olsson, Christopher Olah, Danny Hernandez, Dawn Drain, Deep Ganguli, Dustin Li, Eli Tran-Johnson, Ethan Perez, Jamie Kerr, Jared Mueller, Jeffrey Ladish, Joshua Landau, Kamal Ndousse, Kamile Lukosuite, Liane Lovitt, Michael Sellitto, Nelson Elhage, Nicholas Schiefer, Noemi Mercado, Nova DasSarma, Robert Lasenby, Robin Larson, Sam Ringer, Scott Johnston, Shauna Kravec, Sheer El Showk, Stanislav Fort, Tamera Lanham, Timothy Telleen-Lawton, Tom Conerly, Tom Henighan, Tristan Hume, Samuel R. Bowman, Zac Hatfield-Dodds, Ben Mann, Dario Amodei, Nicholas Joseph, Sam McCandlish, Tom Brown, Jared Kaplan | Published: 2022-12-15
Alignment
Prompt Injection
Performance Evaluation

Dissecting Distribution Inference

Authors: Anshuman Suri, Yifu Lu, Yanjin Chen, David Evans | Published: 2022-12-15 | Updated: 2024-04-05
Privacy Risk Management
Privacy Protection Method
Membership Inference

FNDaaS: Content-agnostic Detection of Fake News sites

Authors: Panagiotis Papadopoulos, Dimitris Spithouris, Evangelos P. Markatos, Nicolas Kourtellis | Published: 2022-12-13 | Updated: 2025-03-18
Detection of Misinformation
Malicious Website Detection
Feature Engineering