Data Protection Method

SoK: Assessing the State of Applied Federated Machine Learning

Authors: Tobias Müller, Maximilian Stäbler, Hugo Gascón, Frank Köster, Florian Matthes | Published: 2023-08-03
Scalability Analysis
Data Protection Method
Federated Learning

Global Differential Privacy for Distributed Metaverse Healthcare Systems

Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-20
Watermarking
Data Protection Method
Machine Learning Method

Digital Healthcare in The Metaverse: Insights into Privacy and Security

Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-10
Data Protection Method
Backdoor Attack
Privacy Risk Management

Protecting User Privacy in Remote Conversational Systems: A Privacy-Preserving framework based on text sanitization

Authors: Zhigang Kan, Linbo Qiao, Hao Yu, Liwen Peng, Yifu Gao, Dongsheng Li | Published: 2023-06-14
Data Protection Method
Privacy Technique
Information Extraction

Differentially Private One Permutation Hashing and Bin-wise Consistent Weighted Sampling

Authors: Xiaoyun Li, Ping Li | Published: 2023-06-13
Data Privacy Assessment
Data Protection Method
Privacy Technique

Synthetic Text Generation with Differential Privacy: A Simple and Practical Recipe

Authors: Xiang Yue, Huseyin A. Inan, Xuechen Li, Girish Kumar, Julia McAnallen, Hoda Shajari, Huan Sun, David Levitan, Robert Sim | Published: 2022-10-25 | Updated: 2023-07-18
Data Privacy Assessment
Data Protection Method
Privacy Protection

Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources

Authors: Philipp Kuehn, David N. Relke, Christian Reuter | Published: 2022-10-05
Data Origins and Evolution
Data Protection Method
Risk Assessment Method

Certified Data Removal in Sum-Product Networks

Authors: Alexander Becker, Thomas Liebig | Published: 2022-10-04
Data Protection Method
Privacy Protection Method
Privacy Assessment

No Free Lunch in “Privacy for Free: How does Dataset Condensation Help Privacy”

Authors: Nicholas Carlini, Vitaly Feldman, Milad Nasr | Published: 2022-09-29
Data Protection Method
Privacy Assessment
Model Design

Anomaly localization for copy detection patterns through print estimations

Authors: Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2022-09-29
Data Protection Method
User Authentication System
Performance Evaluation Metrics