RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release Authors: Thee Chanyaswad, Changchang Liu, Prateek Mittal | Published: 2017-08-31 | Updated: 2018-10-16 Detection of Poison Data for Backdoor AttacksPrivacy Protection MethodGenerative Model 2017.08.31 2025.05.28 Literature Database
Coppersmith’s lattices and “focus groups”: an attack on small-exponent RSA Authors: Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan | Published: 2017-08-30 | Updated: 2020-12-16 Privacy Protection MethodAttack MethodMathematical Analysis 2017.08.30 2025.05.28 Literature Database
Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning Authors: Wei-Han Lee, Ruby B. Lee | Published: 2017-08-30 Sensor Information ManagementPrivacy Protection MethodUser Behavior Analysis 2017.08.30 2025.05.28 Literature Database
Plausible Deniability for Privacy-Preserving Data Synthesis Authors: Vincent Bindschaedler, Reza Shokri, Carl A. Gunter | Published: 2017-08-26 Privacy Protection MethodModel Performance EvaluationGenerative Model 2017.08.26 2025.05.28 Literature Database
Knock Knock, Who’s There? Membership Inference on Aggregate Location Data Authors: Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro | Published: 2017-08-21 | Updated: 2017-11-29 Privacy Protection MethodPrivacy Loss AnalysisUser Behavior Analysis 2017.08.21 2025.05.28 Literature Database
Secure Search on the Cloud via Coresets and Sketches Authors: Adi Akavia, Dan Feldman, Hayim Shaul | Published: 2017-08-19 Privacy Protection MethodSecure Arithmetic ComputationMathematical Analysis 2017.08.19 2025.05.28 Literature Database