SoK: Assessing the State of Applied Federated Machine Learning Authors: Tobias Müller, Maximilian Stäbler, Hugo Gascón, Frank Köster, Florian Matthes | Published: 2023-08-03 Scalability AnalysisData Protection MethodFederated Learning 2023.08.03 2025.05.28 Literature Database
Global Differential Privacy for Distributed Metaverse Healthcare Systems Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-20 WatermarkingData Protection MethodMachine Learning Method 2023.07.22 2025.05.28 Literature Database
Digital Healthcare in The Metaverse: Insights into Privacy and Security Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-10 Data Protection MethodBackdoor AttackPrivacy Risk Management 2023.07.22 2025.05.28 Literature Database
Protecting User Privacy in Remote Conversational Systems: A Privacy-Preserving framework based on text sanitization Authors: Zhigang Kan, Linbo Qiao, Hao Yu, Liwen Peng, Yifu Gao, Dongsheng Li | Published: 2023-06-14 Data Protection MethodPrivacy TechniqueInformation Extraction 2023.06.14 2025.05.28 Literature Database
Differentially Private One Permutation Hashing and Bin-wise Consistent Weighted Sampling Authors: Xiaoyun Li, Ping Li | Published: 2023-06-13 Data Privacy AssessmentData Protection MethodPrivacy Technique 2023.06.13 2025.05.28 Literature Database
Synthetic Text Generation with Differential Privacy: A Simple and Practical Recipe Authors: Xiang Yue, Huseyin A. Inan, Xuechen Li, Girish Kumar, Julia McAnallen, Hoda Shajari, Huan Sun, David Levitan, Robert Sim | Published: 2022-10-25 | Updated: 2023-07-18 Data Privacy AssessmentData Protection MethodPrivacy Protection 2022.10.25 2025.05.28 Literature Database
Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources Authors: Philipp Kuehn, David N. Relke, Christian Reuter | Published: 2022-10-05 Data Origins and EvolutionData Protection MethodRisk Assessment Method 2022.10.05 2025.05.28 Literature Database
Certified Data Removal in Sum-Product Networks Authors: Alexander Becker, Thomas Liebig | Published: 2022-10-04 Data Protection MethodPrivacy Protection MethodPrivacy Assessment 2022.10.04 2025.05.28 Literature Database
No Free Lunch in “Privacy for Free: How does Dataset Condensation Help Privacy” Authors: Nicholas Carlini, Vitaly Feldman, Milad Nasr | Published: 2022-09-29 Data Protection MethodPrivacy AssessmentModel Design 2022.09.29 2025.05.28 Literature Database
Anomaly localization for copy detection patterns through print estimations Authors: Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2022-09-29 Data Protection MethodUser Authentication SystemPerformance Evaluation Metrics 2022.09.29 2025.05.28 Literature Database