Privacy Protection Method

Data Synthesis based on Generative Adversarial Networks

Authors: Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim | Published: 2018-06-09 | Updated: 2018-07-02
Privacy Protection Method
Synthetic Data Generation
Loss Term

Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware

Authors: Florian Tramèr, Dan Boneh | Published: 2018-06-08 | Updated: 2019-02-27
Privacy Protection Method
Formal Verification
Deep Learning Technology

Blind Justice: Fairness with Encrypted Sensitive Attributes

Authors: Niki Kilbertus, Adrià Gascón, Matt J. Kusner, Michael Veale, Krishna P. Gummadi, Adrian Weller | Published: 2018-06-08
Privacy Protection Method
Fairness Requirements
Secret Distributed Computation

Improving the Privacy and Accuracy of ADMM-Based Distributed Algorithms

Authors: Xueru Zhang, Mohammad Mahdi Khalili, Mingyan Liu | Published: 2018-06-06
Privacy Protection Method
Certified Robustness
Federated Learning

Differentially Private Confidence Intervals for Empirical Risk Minimization

Authors: Yue Wang, Daniel Kifer, Jaewoo Lee | Published: 2018-04-11
Privacy Protection Method
Differential Privacy
Statistical Methods

Privacy-Preserving Deep Inference for Rich User Data on The Cloud

Authors: Seyed Ali Osia, Ali Shahin Shamsabadi, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi | Published: 2017-10-04 | Updated: 2017-10-11
Privacy Protection Method
Model Inversion
Facial Recognition Technology

Privacy Preserving Identification Using Sparse Approximation with Ambiguization

Authors: Behrooz Razeghi, Slava Voloshynovskiy, Dimche Kostadinov, Olga Taran | Published: 2017-09-29
Sparse Coding
Privacy Protection
Privacy Protection Method

RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release

Authors: Thee Chanyaswad, Changchang Liu, Prateek Mittal | Published: 2017-08-31 | Updated: 2018-10-16
Detection of Poison Data for Backdoor Attacks
Privacy Protection Method
Generative Model

Coppersmith’s lattices and “focus groups”: an attack on small-exponent RSA

Authors: Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan | Published: 2017-08-30 | Updated: 2020-12-16
Privacy Protection Method
Attack Method
Mathematical Analysis

Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning

Authors: Wei-Han Lee, Ruby B. Lee | Published: 2017-08-30
Sensor Information Management
Privacy Protection Method
User Behavior Analysis