A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends Authors: Yao Zhao, Youyang Qu, Yong Xiang, Md Palash Uddin, Dezhong Peng, Longxiang Gao | Published: 2022-10-20 | Updated: 2024-08-07 Security AnalysisPrivacy Risk ManagementComputational Efficiency 2022.10.20 2025.05.28 Literature Database
Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2 Authors: Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti | Published: 2022-10-17 | Updated: 2023-04-30 Security AnalysisData Privacy AssessmentPrivacy Risk Management 2022.10.17 2025.05.28 Literature Database
Stochastic Differentially Private and Fair Learning Authors: Andrew Lowy, Devansh Gupta, Meisam Razaviyayn | Published: 2022-10-17 | Updated: 2023-06-03 Privacy Risk ManagementPrivacy AssessmentConvergence Guarantee 2022.10.17 2025.05.28 Literature Database
A General Framework for Auditing Differentially Private Machine Learning Authors: Fred Lu, Joseph Munoz, Maya Fuchs, Tyler LeBlond, Elliott Zaresky-Williams, Edward Raff, Francis Ferraro, Brian Testa | Published: 2022-10-16 | Updated: 2023-01-06 Privacy Risk ManagementPrivacy AssessmentMembership Inference 2022.10.16 2025.05.28 Literature Database
Federated Learning with Privacy-Preserving Ensemble Attention Distillation Authors: Xuan Gong, Liangchen Song, Rishi Vedula, Abhishek Sharma, Meng Zheng, Benjamin Planche, Arun Innanje, Terrence Chen, Junsong Yuan, David Doermann, Ziyan Wu | Published: 2022-10-16 Privacy Risk ManagementPoisoningPerformance Evaluation 2022.10.16 2025.05.28 Literature Database
Sketching for First Order Method: Efficient Algorithm for Low-Bandwidth Channel and Vulnerability Authors: Zhao Song, Yitan Wang, Zheng Yu, Lichen Zhang | Published: 2022-10-15 | Updated: 2023-06-06 Algorithm DesignPrivacy Risk ManagementConvergence Guarantee 2022.10.15 2025.05.28 Literature Database
Federated Learning for Tabular Data: Exploring Potential Risk to Privacy Authors: Han Wu, Zilong Zhao, Lydia Y. Chen, Aad van Moorsel | Published: 2022-10-13 Privacy Risk ManagementPoisoningGenerative Adversarial Network 2022.10.13 2025.05.28 Literature Database
Data Privacy and Trustworthy Machine Learning Authors: Martin Strobel, Reza Shokri | Published: 2022-09-14 Bias Mitigation TechniquesPrivacy Risk ManagementMembership Inference 2022.09.14 2025.05.28 Literature Database
Inferring Sensitive Attributes from Model Explanations Authors: Vasisht Duddu, Antoine Boutet | Published: 2022-08-21 | Updated: 2022-09-07 Privacy Risk ManagementMembership InferenceAttack Scenario Analysis 2022.08.21 2025.05.28 Literature Database
Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy Authors: Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han | Published: 2022-08-18 Training ProtocolPrivacy Risk ManagementCommunication Efficiency 2022.08.18 2025.05.28 Literature Database