Privacy Protection Method

Privacy Preserving Location Data Publishing: A Machine Learning Approach

Authors: Sina Shaham, Ming Ding, Bo Liu, Shuping Dang, Zihuai Lin, Jun Li | Published: 2019-02-24 | Updated: 2019-11-05
Data Anonymization Techniques
Privacy Protection Method
Dynamic Alignment Algorithm

Achieving Data Utility-Privacy Tradeoff in Internet of Medical Things: A Machine Learning Approach

Authors: Zhitao Guan, Zefang Lv, Xiaojiang Du, Longfei Wu, Mohsen Guizani | Published: 2019-02-08
Privacy Protection Method
Initial Seed Generation
Differential Privacy

Privacy Preserving Analytics on Distributed Medical Data

Authors: Marina Blanton, Ah Reum Kang, Subhadeep Karan, Jaroslaw Zola | Published: 2018-06-18
Data Preprocessing
Privacy Protection Method
Differential Privacy

Data Synthesis based on Generative Adversarial Networks

Authors: Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim | Published: 2018-06-09 | Updated: 2018-07-02
Privacy Protection Method
Synthetic Data Generation
Loss Term

Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware

Authors: Florian Tramèr, Dan Boneh | Published: 2018-06-08 | Updated: 2019-02-27
Privacy Protection Method
Formal Verification
Deep Learning Technology

Blind Justice: Fairness with Encrypted Sensitive Attributes

Authors: Niki Kilbertus, Adrià Gascón, Matt J. Kusner, Michael Veale, Krishna P. Gummadi, Adrian Weller | Published: 2018-06-08
Privacy Protection Method
Fairness Requirements
Secret Distributed Computation

Improving the Privacy and Accuracy of ADMM-Based Distributed Algorithms

Authors: Xueru Zhang, Mohammad Mahdi Khalili, Mingyan Liu | Published: 2018-06-06
Privacy Protection Method
Certified Robustness
Federated Learning

Differentially Private Confidence Intervals for Empirical Risk Minimization

Authors: Yue Wang, Daniel Kifer, Jaewoo Lee | Published: 2018-04-11
Privacy Protection Method
Differential Privacy
Statistical Methods

Privacy-Preserving Deep Inference for Rich User Data on The Cloud

Authors: Seyed Ali Osia, Ali Shahin Shamsabadi, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi | Published: 2017-10-04 | Updated: 2017-10-11
Privacy Protection Method
Model Inversion
Facial Recognition Technology

Privacy Preserving Identification Using Sparse Approximation with Ambiguization

Authors: Behrooz Razeghi, Slava Voloshynovskiy, Dimche Kostadinov, Olga Taran | Published: 2017-09-29
Sparse Coding
Privacy Protection
Privacy Protection Method