Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning Authors: Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu | Published: 2022-10-05 | Updated: 2024-04-19 DNN IP Protection MethodPrivacy Protection MethodCommunication Efficiency 2022.10.05 2025.05.28 Literature Database
Recycling Scraps: Improving Private Learning by Leveraging Intermediate Checkpoints Authors: Virat Shejwalkar, Arun Ganesh, Rajiv Mathews, Yarong Mu, Shuang Song, Om Thakkar, Abhradeep Thakurta, Xinyi Zheng | Published: 2022-10-04 | Updated: 2024-09-17 Privacy Protection MethodPrivacy AssessmentDeep Learning Method 2022.10.04 2025.05.28 Literature Database
Certified Data Removal in Sum-Product Networks Authors: Alexander Becker, Thomas Liebig | Published: 2022-10-04 Data Protection MethodPrivacy Protection MethodPrivacy Assessment 2022.10.04 2025.05.28 Literature Database
Preprint: Privacy-preserving IoT Data Sharing Scheme Authors: Ali Abdullah S. AlQahtani, Hosam Alamleh, Reem Alrawili | Published: 2022-09-26 IoT Security RisksPrivacy Protection MethodUser Authentication System 2022.09.26 2025.05.28 Literature Database
FaRO 2: an Open Source, Configurable Smart City Framework for Real-Time Distributed Vision and Biometric Systems Authors: Joel Brogan, Nell Barber, David Cornett, David Bolme | Published: 2022-09-26 Privacy Protection MethodFrameworkFace Recognition System 2022.09.26 2025.05.28 Literature Database
Deep Learning-based Anonymization of Chest Radiographs: A Utility-preserving Measure for Patient Privacy Authors: Kai Packhäuser, Sebastian Gündel, Florian Thamm, Felix Denzinger, Andreas Maier | Published: 2022-09-23 | Updated: 2023-07-24 Privacy Protection MethodPrivacy AssessmentDeep Learning Method 2022.09.23 2025.05.28 Literature Database
Federated and Privacy-Preserving Learning of Accounting Data in Financial Statement Audits Authors: Marco Schreyer, Timur Sattarov, Damian Borth | Published: 2022-08-26 Privacy Protection MethodFrameworkExperimental Validation 2022.08.26 2025.05.28 Literature Database
I still know it’s you! On Challenges in Anonymizing Source Code Authors: Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck | Published: 2022-08-26 | Updated: 2024-04-10 Code AnonymityPrivacy Protection MethodUncertainty Assessment 2022.08.26 2025.05.28 Literature Database
Sotto Voce: Federated Speech Recognition with Differential Privacy Guarantees Authors: Michael Shoemate, Kevin Jett, Ethan Cowan, Sean Colbath, James Honaker, Prasanna Muthukumar | Published: 2022-07-16 Privacy Protection MethodInformation-Theoretic PrivacySpeech Recognition Process 2022.07.16 2025.05.28 Literature Database
DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting Authors: Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, Heiko Ludwig | Published: 2022-07-15 Algorithm DesignPrivacy Protection MethodTrust Evaluation Module 2022.07.15 2025.05.28 Literature Database