Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms Authors: Mohsen Minaei, S Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate | Published: 2020-05-28 Data Protection MethodPrivacy AssessmentAdversarial Attack Methods 2020.05.28 2025.05.28 Literature Database
TIPRDC: Task-Independent Privacy-Respecting Data Crowdsourcing Framework for Deep Learning with Anonymized Intermediate Representations Authors: Ang Li, Yixiao Duan, Huanrui Yang, Yiran Chen, Jianlei Yang | Published: 2020-05-23 | Updated: 2020-08-25 Data Protection MethodPrivacy AssessmentFeature Extraction Method 2020.05.23 2025.05.28 Literature Database
A Deep Learning Based Attack for The Chaos-based Image Encryption Authors: Chen He, Kan Ming, Yongwei Wang, Z. Jane Wang | Published: 2019-07-29 Data Protection MethodLoss FunctionCryptographic Protocol 2019.07.29 2025.05.28 Literature Database
Privacy-Enhancing Context Authentication from Location-Sensitive Data Authors: Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas | Published: 2019-04-18 | Updated: 2019-07-10 Data Protection MethodPrivacy ProtectionAuthentication Technology 2019.04.18 2025.05.28 Literature Database
CryptoNN: Training Neural Networks over Encrypted Data Authors: Runhua Xu, James B. D. Joshi, Chao Li | Published: 2019-04-15 | Updated: 2019-04-26 Data Protection MethodPrivacy Protection MethodCryptography 2019.04.15 2025.05.28 Literature Database
TG-PSM: Tunable Greedy Packet Sequence Morphing Based on Trace Clustering Authors: Farzam Fanitabasi | Published: 2019-04-01 Data Protection MethodData-Driven ClusteringPrivacy Protection Method 2019.04.01 2025.05.28 Literature Database
Private Machine Learning in TensorFlow using Secure Computation Authors: Morten Dahl, Jason Mancuso, Yann Dupis, Ben Decoste, Morgan Giraud, Ian Livingstone, Justin Patriquin, Gavin Uhma | Published: 2018-10-18 | Updated: 2018-10-23 Data Protection MethodPrivacy Risk ManagementComputational Consistency 2018.10.18 2025.05.28 Literature Database
IDMoB: IoT Data Marketplace on Blockchain Authors: Kazım Rıfat Özyılmaz, Mehmet Doğan, Arda Yurdakul | Published: 2018-09-30 IoT-Specific ThreatsData Protection MethodVoting Mechanism 2018.09.30 2025.05.28 Literature Database
SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation Authors: Prabuddha Chakraborty, Jonathan Cruz, Swarup Bhunia | Published: 2018-09-27 Data Protection MethodRobustness Improvement MethodEfficiency Evaluation 2018.09.27 2025.05.28 Literature Database
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT Authors: Meng Shen, Baoli Ma, Liehuang Zhu, Xiaojiang Du, Ke Xu | Published: 2018-09-21 Data Protection MethodPrivacy Risk ManagementEncryption Method 2018.09.21 2025.05.28 Literature Database