Privacy Protection Method

I still know it’s you! On Challenges in Anonymizing Source Code

Authors: Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck | Published: 2022-08-26 | Updated: 2024-04-10
Code Anonymity
Privacy Protection Method
Uncertainty Assessment

Sotto Voce: Federated Speech Recognition with Differential Privacy Guarantees

Authors: Michael Shoemate, Kevin Jett, Ethan Cowan, Sean Colbath, James Honaker, Prasanna Muthukumar | Published: 2022-07-16
Privacy Protection Method
Information-Theoretic Privacy
Speech Recognition Process

DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting

Authors: Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, Heiko Ludwig | Published: 2022-07-15
Algorithm Design
Privacy Protection Method
Trust Evaluation Module

Smooth Anonymity for Sparse Graphs

Authors: Alessandro Epasto, Hossein Esfandiari, Vahab Mirrokni, Andres Munoz Medina | Published: 2022-07-13 | Updated: 2024-05-14
Algorithm Design
Dataset evaluation
Privacy Protection Method

Unlocking High-Accuracy Differentially Private Image Classification through Scale

Authors: Soham De, Leonard Berrada, Jamie Hayes, Samuel L. Smith, Borja Balle | Published: 2022-04-28 | Updated: 2022-06-16
Privacy Protection Method
Model Design
Computational Efficiency

Federated Stochastic Primal-dual Learning with Differential Privacy

Authors: Yiwei Li, Shuai Wang, Tsung-Hui Chang, Chong-Yung Chi | Published: 2022-04-26
Privacy Protection Method
Convergence Analysis
Communication Efficiency

Towards Privacy-Preserving Neural Architecture Search

Authors: Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss | Published: 2022-04-22
Privacy Protection Method
Privacy Enhancing Technology
Model Design

Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks

Authors: Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava | Published: 2022-04-21
Privacy Protection Method
Fundamentals of Machine Learning
Anomaly Detection Method

Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems

Authors: Sankha Baran Dutta, Hoda Naghibijouybari, Arjun Gupta, Nael Abu-Ghazaleh, Andres Marquez, Kevin Barker | Published: 2022-03-30
GPU Vulnerability
Privacy Protection Method
Physical attack

Quantum Differential Privacy: An Information Theory Perspective

Authors: Christoph Hirche, Cambyse Rouzé, Daniel Stilck França | Published: 2022-02-22 | Updated: 2023-04-06
Privacy Protection
Privacy Protection Method
Quantum Computing