Data Synthesis based on Generative Adversarial Networks Authors: Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim | Published: 2018-06-09 | Updated: 2018-07-02 Privacy Protection MethodSynthetic Data GenerationLoss Term 2018.06.09 2025.05.28 Literature Database
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware Authors: Florian Tramèr, Dan Boneh | Published: 2018-06-08 | Updated: 2019-02-27 Privacy Protection MethodFormal VerificationDeep Learning Technology 2018.06.08 2025.05.28 Literature Database
Blind Justice: Fairness with Encrypted Sensitive Attributes Authors: Niki Kilbertus, Adrià Gascón, Matt J. Kusner, Michael Veale, Krishna P. Gummadi, Adrian Weller | Published: 2018-06-08 Privacy Protection MethodFairness RequirementsSecret Distributed Computation 2018.06.08 2025.05.28 Literature Database
Improving the Privacy and Accuracy of ADMM-Based Distributed Algorithms Authors: Xueru Zhang, Mohammad Mahdi Khalili, Mingyan Liu | Published: 2018-06-06 Privacy Protection MethodCertified RobustnessFederated Learning 2018.06.06 2025.05.28 Literature Database
Differentially Private Confidence Intervals for Empirical Risk Minimization Authors: Yue Wang, Daniel Kifer, Jaewoo Lee | Published: 2018-04-11 Privacy Protection MethodDifferential PrivacyStatistical Methods 2018.04.11 2025.05.28 Literature Database
Privacy-Preserving Deep Inference for Rich User Data on The Cloud Authors: Seyed Ali Osia, Ali Shahin Shamsabadi, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi | Published: 2017-10-04 | Updated: 2017-10-11 Privacy Protection MethodModel InversionFacial Recognition Technology 2017.10.04 2025.05.28 Literature Database
Privacy Preserving Identification Using Sparse Approximation with Ambiguization Authors: Behrooz Razeghi, Slava Voloshynovskiy, Dimche Kostadinov, Olga Taran | Published: 2017-09-29 Sparse CodingPrivacy ProtectionPrivacy Protection Method 2017.09.29 2025.05.28 Literature Database
RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release Authors: Thee Chanyaswad, Changchang Liu, Prateek Mittal | Published: 2017-08-31 | Updated: 2018-10-16 Detection of Poison Data for Backdoor AttacksPrivacy Protection MethodGenerative Model 2017.08.31 2025.05.28 Literature Database
Coppersmith’s lattices and “focus groups”: an attack on small-exponent RSA Authors: Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan | Published: 2017-08-30 | Updated: 2020-12-16 Privacy Protection MethodAttack MethodMathematical Analysis 2017.08.30 2025.05.28 Literature Database
Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning Authors: Wei-Han Lee, Ruby B. Lee | Published: 2017-08-30 Sensor Information ManagementPrivacy Protection MethodUser Behavior Analysis 2017.08.30 2025.05.28 Literature Database