I still know it’s you! On Challenges in Anonymizing Source Code Authors: Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck | Published: 2022-08-26 | Updated: 2024-04-10 Code AnonymityPrivacy Protection MethodUncertainty Assessment 2022.08.26 2025.05.28 Literature Database
Sotto Voce: Federated Speech Recognition with Differential Privacy Guarantees Authors: Michael Shoemate, Kevin Jett, Ethan Cowan, Sean Colbath, James Honaker, Prasanna Muthukumar | Published: 2022-07-16 Privacy Protection MethodInformation-Theoretic PrivacySpeech Recognition Process 2022.07.16 2025.05.28 Literature Database
DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting Authors: Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, Heiko Ludwig | Published: 2022-07-15 Algorithm DesignPrivacy Protection MethodTrust Evaluation Module 2022.07.15 2025.05.28 Literature Database
Smooth Anonymity for Sparse Graphs Authors: Alessandro Epasto, Hossein Esfandiari, Vahab Mirrokni, Andres Munoz Medina | Published: 2022-07-13 | Updated: 2024-05-14 Algorithm DesignDataset evaluationPrivacy Protection Method 2022.07.13 2025.05.28 Literature Database
Unlocking High-Accuracy Differentially Private Image Classification through Scale Authors: Soham De, Leonard Berrada, Jamie Hayes, Samuel L. Smith, Borja Balle | Published: 2022-04-28 | Updated: 2022-06-16 Privacy Protection MethodModel DesignComputational Efficiency 2022.04.28 2025.05.28 Literature Database
Federated Stochastic Primal-dual Learning with Differential Privacy Authors: Yiwei Li, Shuai Wang, Tsung-Hui Chang, Chong-Yung Chi | Published: 2022-04-26 Privacy Protection MethodConvergence AnalysisCommunication Efficiency 2022.04.26 2025.05.28 Literature Database
Towards Privacy-Preserving Neural Architecture Search Authors: Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss | Published: 2022-04-22 Privacy Protection MethodPrivacy Enhancing TechnologyModel Design 2022.04.22 2025.05.28 Literature Database
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks Authors: Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava | Published: 2022-04-21 Privacy Protection MethodFundamentals of Machine LearningAnomaly Detection Method 2022.04.21 2025.05.28 Literature Database
Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems Authors: Sankha Baran Dutta, Hoda Naghibijouybari, Arjun Gupta, Nael Abu-Ghazaleh, Andres Marquez, Kevin Barker | Published: 2022-03-30 GPU VulnerabilityPrivacy Protection MethodPhysical attack 2022.03.30 2025.05.28 Literature Database
Quantum Differential Privacy: An Information Theory Perspective Authors: Christoph Hirche, Cambyse Rouzé, Daniel Stilck França | Published: 2022-02-22 | Updated: 2023-04-06 Privacy ProtectionPrivacy Protection MethodQuantum Computing 2022.02.22 2025.05.28 Literature Database