Data Protection Method

Anomaly detection optimization using big data and deep learning to reduce false-positive

Authors: Khloud Al Jallad, Mohamad Aljnidi, Mohammad Said Desouki | Published: 2022-09-28
Security label
Data Protection Method
Deep Learning Method

Machine Learning with Confidential Computing: A Systematization of Knowledge

Authors: Fan Mo, Zahra Tarkhani, Hamed Haddadi | Published: 2022-08-22 | Updated: 2024-06-03
TEE Implementation
Data Protection Method
Membership Inference

Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System

Authors: Abdur R. Shahid, Ahmed Imteaj, Peter Y. Wu, Diane A. Igoche, Tauhidul Alam | Published: 2022-08-17
Data Protection Method
Poisoning
Attack Detection

Practical Vertical Federated Learning with Unsupervised Representation Learning

Authors: Zhaomin Wu, Qinbin Li, Bingsheng He | Published: 2022-08-13
Data Protection Method
Privacy Risk Management
Communication Efficiency

SecFL: Confidential Federated Learning using TEEs

Authors: Do Le Quoc, Christof Fetzer | Published: 2021-10-03 | Updated: 2021-10-07
Data Protection Method
Privacy Risk Management
Federated Learning

Citadel: Protecting Data Privacy and Model Confidentiality for Collaborative Learning with SGX

Authors: Chengliang Zhang, Junzhe Xia, Baichen Yang, Huancheng Puyang, Wei Wang, Ruichuan Chen, Istemi Ekin Akkus, Paarijaat Aditya, Feng Yan | Published: 2021-05-04 | Updated: 2021-11-08
Data Privacy Assessment
Data Protection Method
Privacy Protection

Quantifying the Tradeoff Between Cybersecurity and Location Privacy

Authors: Dajiang Suo, M. Elena Renda, Jinhua Zhao | Published: 2021-05-04 | Updated: 2021-12-10
Data Privacy Assessment
Data Protection Method
Privacy Protection

GRNN: Generative Regression Neural Network — A Data Leakage Attack for Federated Learning

Authors: Hanchi Ren, Jingjing Deng, Xianghua Xie | Published: 2021-05-02 | Updated: 2022-09-12
Data Protection Method
Visual Similarity Detection
Face Recognition System

Influence Based Defense Against Data Poisoning Attacks in Online Learning

Authors: Sanjay Seetharaman, Shubham Malaviya, Rosni KV, Manish Shukla, Sachin Lodha | Published: 2021-04-24
Data Protection Method
Poisoning
Defense Mechanism

Secure Human Action Recognition by Encrypted Neural Network Inference

Authors: Miran Kim, Xiaoqian Jiang, Kristin Lauter, Elkhan Ismayilzada, Shayan Shams | Published: 2021-04-19 | Updated: 2022-08-09
Data Protection Method
Data Management System
Encryption Technology