CryptoNN: Training Neural Networks over Encrypted Data Authors: Runhua Xu, James B. D. Joshi, Chao Li | Published: 2019-04-15 | Updated: 2019-04-26 Data Protection MethodPrivacy Protection MethodCryptography 2019.04.15 2025.05.28 Literature Database
TG-PSM: Tunable Greedy Packet Sequence Morphing Based on Trace Clustering Authors: Farzam Fanitabasi | Published: 2019-04-01 Data Protection MethodData-Driven ClusteringPrivacy Protection Method 2019.04.01 2025.05.28 Literature Database
AutoGAN-based Dimension Reduction for Privacy Preservation Authors: Hung Nguyen, Di Zhuang, Pei-Yuan Wu, Morris Chang | Published: 2019-02-27 | Updated: 2021-07-27 Privacy Protection MethodMulti-Class ClassificationModel Inversion 2019.02.27 2025.05.28 Literature Database
Privacy Preserving Location Data Publishing: A Machine Learning Approach Authors: Sina Shaham, Ming Ding, Bo Liu, Shuping Dang, Zihuai Lin, Jun Li | Published: 2019-02-24 | Updated: 2019-11-05 Data Anonymization TechniquesPrivacy Protection MethodDynamic Alignment Algorithm 2019.02.24 2025.05.28 Literature Database
Achieving Data Utility-Privacy Tradeoff in Internet of Medical Things: A Machine Learning Approach Authors: Zhitao Guan, Zefang Lv, Xiaojiang Du, Longfei Wu, Mohsen Guizani | Published: 2019-02-08 Privacy Protection MethodInitial Seed GenerationDifferential Privacy 2019.02.08 2025.05.28 Literature Database
Privacy Preserving Analytics on Distributed Medical Data Authors: Marina Blanton, Ah Reum Kang, Subhadeep Karan, Jaroslaw Zola | Published: 2018-06-18 Data PreprocessingPrivacy Protection MethodDifferential Privacy 2018.06.18 2025.05.28 Literature Database
Data Synthesis based on Generative Adversarial Networks Authors: Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim | Published: 2018-06-09 | Updated: 2018-07-02 Privacy Protection MethodSynthetic Data GenerationLoss Term 2018.06.09 2025.05.28 Literature Database
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware Authors: Florian Tramèr, Dan Boneh | Published: 2018-06-08 | Updated: 2019-02-27 Privacy Protection MethodFormal VerificationDeep Learning Technology 2018.06.08 2025.05.28 Literature Database
Blind Justice: Fairness with Encrypted Sensitive Attributes Authors: Niki Kilbertus, Adrià Gascón, Matt J. Kusner, Michael Veale, Krishna P. Gummadi, Adrian Weller | Published: 2018-06-08 Privacy Protection MethodFairness RequirementsSecret Distributed Computation 2018.06.08 2025.05.28 Literature Database
Improving the Privacy and Accuracy of ADMM-Based Distributed Algorithms Authors: Xueru Zhang, Mohammad Mahdi Khalili, Mingyan Liu | Published: 2018-06-06 Privacy Protection MethodCertified RobustnessFederated Learning 2018.06.06 2025.05.28 Literature Database