Privacy Protection Method

RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release

Authors: Thee Chanyaswad, Changchang Liu, Prateek Mittal | Published: 2017-08-31 | Updated: 2018-10-16
Detection of Poison Data for Backdoor Attacks
Privacy Protection Method
Generative Model

Coppersmith’s lattices and “focus groups”: an attack on small-exponent RSA

Authors: Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan | Published: 2017-08-30 | Updated: 2020-12-16
Privacy Protection Method
Attack Method
Mathematical Analysis

Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning

Authors: Wei-Han Lee, Ruby B. Lee | Published: 2017-08-30
Sensor Information Management
Privacy Protection Method
User Behavior Analysis

Plausible Deniability for Privacy-Preserving Data Synthesis

Authors: Vincent Bindschaedler, Reza Shokri, Carl A. Gunter | Published: 2017-08-26
Privacy Protection Method
Model Performance Evaluation
Generative Model

Knock Knock, Who’s There? Membership Inference on Aggregate Location Data

Authors: Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro | Published: 2017-08-21 | Updated: 2017-11-29
Privacy Protection Method
Privacy Loss Analysis
User Behavior Analysis

Secure Search on the Cloud via Coresets and Sketches

Authors: Adi Akavia, Dan Feldman, Hayim Shaul | Published: 2017-08-19
Privacy Protection Method
Secure Arithmetic Computation
Mathematical Analysis