Defending against Reconstruction Attacks with Rényi Differential Privacy Authors: Pierre Stock, Igor Shilov, Ilya Mironov, Alexandre Sablayrolles | Published: 2022-02-15 Privacy Risk ManagementMembership InferenceMembership Disclosure Risk 2022.02.15 2025.05.28 Literature Database
Personalization Improves Privacy-Accuracy Tradeoffs in Federated Learning Authors: Alberto Bietti, Chen-Yu Wei, Miroslav Dudík, John Langford, Zhiwei Steven Wu | Published: 2022-02-10 | Updated: 2022-07-15 Algorithm DesignPrivacy Risk ManagementPrivacy Enhancing Protocol 2022.02.10 2025.05.28 Literature Database
PrivFair: a Library for Privacy-Preserving Fairness Auditing Authors: Sikha Pentyala, David Melanson, Martine De Cock, Golnoosh Farnadi | Published: 2022-02-08 | Updated: 2022-05-23 Privacy Risk ManagementPrivacy Enhancing ProtocolReview and Investigation 2022.02.08 2025.05.28 Literature Database
Membership Inference Attacks and Defenses in Neural Network Pruning Authors: Xiaoyong Yuan, Lan Zhang | Published: 2022-02-07 | Updated: 2022-08-03 Privacy Risk ManagementMembership Disclosure RiskDefense Method 2022.02.07 2025.05.28 Literature Database
Parameters or Privacy: A Provable Tradeoff Between Overparameterization and Membership Inference Authors: Jasper Tan, Blake Mason, Hamid Javadi, Richard G. Baraniuk | Published: 2022-02-02 | Updated: 2022-11-30 Privacy Risk ManagementMembership Disclosure RiskOverfitting and Memorization 2022.02.02 2025.05.28 Literature Database
Blockchain Meets AI for Resilient and Intelligent Internet of Vehicles Authors: Pranav Kumar Singh, Sukumar Nandi, Sunit K. Nandi, Uttam Ghosh, Danda B. Rawat | Published: 2021-12-28 Access ControlPrivacy Risk ManagementMachine Learning Technology 2021.12.28 2025.05.28 Literature Database
Differentially-Private Sublinear-Time Clustering Authors: Jeremiah Blocki, Elena Grigorescu, Tamalika Mukherjee | Published: 2021-12-27 Sampling MethodPrivacy Risk ManagementConvergence Guarantee 2021.12.27 2025.05.28 Literature Database
SoK: A Study of the Security on Voice Processing Systems Authors: Robert Chang, Logan Kuo, Arthur Liu, Nader Sehatbakhsh | Published: 2021-12-24 Privacy Risk ManagementAdversarial Attack MethodsDefense Method 2021.12.24 2025.05.28 Literature Database
DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning Authors: Ismat Jarin, Birhanu Eshete | Published: 2021-12-24 Privacy Risk ManagementMulti-Class ClassificationMembership Disclosure Risk 2021.12.24 2025.05.28 Literature Database
Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey Authors: Shangwei Guo, Xu Zhang, Fei Yang, Tianwei Zhang, Yan Gan, Tao Xiang, Yang Liu | Published: 2021-12-19 Backdoor AttackPrivacy Risk ManagementPoisoning 2021.12.19 2025.05.28 Literature Database