Privacy Protection Method

Quantifying Association Capabilities of Large Language Models and Its Implications on Privacy Leakage

Authors: Hanyin Shao, Jie Huang, Shen Zheng, Kevin Chen-Chuan Chang | Published: 2023-05-22 | Updated: 2024-02-09
LLM Performance Evaluation
Privacy Violation
Privacy Protection Method

In the Name of Fairness: Assessing the Bias in Clinical Record De-identification

Authors: Yuxin Xiao, Shulammite Lim, Tom Joseph Pollard, Marzyeh Ghassemi | Published: 2023-05-18 | Updated: 2024-01-03
Privacy Protection Method
Fairness evaluation
Threats of Medical AI

Quadratic Functional Encryption for Secure Training in Vertical Federated Learning

Authors: Shuangyi Chen, Anuja Modi, Shweta Agrawal, Ashish Khisti | Published: 2023-05-15 | Updated: 2023-06-19
DNN IP Protection Method
Training Protocol
Privacy Protection Method

Have it your way: Individualized Privacy Assignment for DP-SGD

Authors: Franziska Boenisch, Christopher Mühl, Adam Dziedzic, Roy Rinberg, Nicolas Papernot | Published: 2023-03-29 | Updated: 2024-01-19
Customization Method
Privacy Protection Method
Privacy Assessment

On the Query Complexity of Training Data Reconstruction in Private Learning

Authors: Prateeti Mukherjee, Satya Lokam | Published: 2023-03-29 | Updated: 2024-01-11
Privacy Protection Method
Privacy Analysis
Privacy Assessment

Dissecting Distribution Inference

Authors: Anshuman Suri, Yifu Lu, Yanjin Chen, David Evans | Published: 2022-12-15 | Updated: 2024-04-05
Privacy Risk Management
Privacy Protection Method
Membership Inference

Towards Fleet-wide Sharing of Wind Turbine Condition Information through Privacy-preserving Federated Learning

Authors: Lorin Jenkel, Stefan Jonas, Angela Meyer | Published: 2022-12-07 | Updated: 2023-07-12
Privacy Protection Method
Model Selection
Condition Monitoring

StyleGAN as a Utility-Preserving Face De-identification Method

Authors: Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh | Published: 2022-12-05 | Updated: 2023-08-31
Privacy Protection Method
Privacy Assessment
Face Recognition Method

HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning

Authors: Pengyu Qiu, Xuhong Zhang, Shouling Ji, Chong Fu, Xing Yang, Ting Wang | Published: 2022-12-01 | Updated: 2024-01-22
Watermarking
Privacy Protection Method
Reconstruction Durability

SoK: Secure Human-centered Wireless Sensing

Authors: Wei Sun, Tingjun Chen, Neil Gong | Published: 2022-11-22 | Updated: 2024-03-09
Privacy Protection Method
Signal Analysis
Wireless Channel Detection