Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks Authors: Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava | Published: 2022-04-21 Privacy Protection MethodFundamentals of Machine LearningAnomaly Detection Method 2022.04.21 2025.05.28 Literature Database
Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems Authors: Sankha Baran Dutta, Hoda Naghibijouybari, Arjun Gupta, Nael Abu-Ghazaleh, Andres Marquez, Kevin Barker | Published: 2022-03-30 GPU VulnerabilityPrivacy Protection MethodPhysical attack 2022.03.30 2025.05.28 Literature Database
Quantum Differential Privacy: An Information Theory Perspective Authors: Christoph Hirche, Cambyse Rouzé, Daniel Stilck França | Published: 2022-02-22 | Updated: 2023-04-06 Privacy ProtectionPrivacy Protection MethodQuantum Computing 2022.02.22 2025.05.28 Literature Database
Antipodes of Label Differential Privacy: PATE and ALIBI Authors: Mani Malek, Ilya Mironov, Karthik Prasad, Igor Shilov, Florian Tramèr | Published: 2021-06-07 | Updated: 2021-10-29 Privacy Protection MethodMembership InferenceLabel Uncertainty 2021.06.07 2025.05.28 Literature Database
Differentially Empirical Risk Minimization under the Fairness Lens Authors: Cuong Tran, My H. Dinh, Ferdinando Fioretto | Published: 2021-06-04 | Updated: 2022-09-08 DP-SGDPrivacy Protection MethodRisk Management 2021.06.04 2025.05.28 Literature Database
On Privacy and Confidentiality of Communications in Organizational Graphs Authors: Masoumeh Shafieinejad, Huseyin Inan, Marcello Hasegawa, Robert Sim | Published: 2021-05-27 Privacy Protection MethodInformation-Theoretic EvaluationVulnerability Assessment Method 2021.05.27 2025.05.28 Literature Database
Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs Authors: Chen Chen, Xuanli He, Lingjuan Lyu, Fangzhao Wu | Published: 2021-05-23 | Updated: 2021-12-26 Privacy Protection MethodMembership InferenceNatural Language Processing 2021.05.23 2025.05.28 Literature Database
Privacy Amplification Via Bernoulli Sampling Authors: Jacob Imola, Kamalika Chaudhuri | Published: 2021-05-21 | Updated: 2021-10-18 Privacy Protection MethodInformation-Theoretic EvaluationOptimization Methods 2021.05.21 2025.05.28 Literature Database
Fed-EINI: An Efficient and Interpretable Inference Framework for Decision Tree Ensembles in Federated Learning Authors: Xiaolin Chen, Shuai Zhou, Bei guan, Kai Yang, Hao Fan, Hu Wang, Yongji Wang | Published: 2021-05-20 | Updated: 2021-12-08 Privacy Protection MethodComputational EfficiencyFederated Learning 2021.05.20 2025.05.28 Literature Database
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions Authors: Runhua Xu, James Joshi | Published: 2020-11-12 | Updated: 2020-12-07 WatermarkingPrivacy Protection MethodEfficiency Evaluation 2020.11.12 2025.05.28 Literature Database