A Systematic and Formal Study of the Impact of Local Differential Privacy on Fairness: Preliminary Results Authors: Karima Makhlouf, Tamara Stefanovic, Heber H. Arcolezi, Catuscia Palamidessi | Published: 2024-05-23 BiasPrivacy ProtectionPrivacy Protection Method 2024.05.23 2025.05.27 Literature Database
Tighter Privacy Auditing of DP-SGD in the Hidden State Threat Model Authors: Tudor Cebere, Aurélien Bellet, Nicolas Papernot | Published: 2024-05-23 | Updated: 2024-10-14 Data Privacy AssessmentPrivacy Protection MethodMembership Inference 2024.05.23 2025.05.27 Literature Database
Federated Domain-Specific Knowledge Transfer on Large Language Models Using Synthetic Data Authors: Haoran Li, Xinyuan Zhao, Dadi Guo, Hanlin Gu, Ziqian Zeng, Yuxing Han, Yangqiu Song, Lixin Fan, Qiang Yang | Published: 2024-05-23 Few-Shot LearningDataset GenerationPrivacy Protection Method 2024.05.23 2025.05.27 Literature Database
Naturally Private Recommendations with Determinantal Point Processes Authors: Jack Fitzsimons, Agustín Freitas Pasqualini, Robert Pisarczyk, Dmitrii Usynin | Published: 2024-05-22 WatermarkingPrivacy Protection MethodWatermark Evaluation 2024.05.22 2025.05.27 Literature Database
Uncertainty quantification by block bootstrap for differentially private stochastic gradient descent Authors: Holger Dette, Carina Graw | Published: 2024-05-21 Simulation Result EvaluationPrivacy Protection MethodOptimization Problem 2024.05.21 2025.05.27 Literature Database
The Effect of Quantization in Federated Learning: A Rényi Differential Privacy Perspective Authors: Tianqu Kang, Lumin Liu, Hengtao He, Jun Zhang, S. H. Song, Khaled B. Letaief | Published: 2024-05-16 Privacy ProtectionPrivacy Protection MethodQuantization and Privacy 2024.05.16 2025.05.27 Literature Database
Learnable Privacy Neurons Localization in Language Models Authors: Ruizhe Chen, Tianxiang Hu, Yang Feng, Zuozhu Liu | Published: 2024-05-16 LLM SecurityPrivacy Protection MethodMembership Inference 2024.05.16 2025.05.27 Literature Database
Differentially Private Federated Learning: A Systematic Review Authors: Jie Fu, Yuan Hong, Xinpeng Ling, Leixia Wang, Xun Ran, Zhiyu Sun, Wendy Hui Wang, Zhili Chen, Yang Cao | Published: 2024-05-14 | Updated: 2024-05-20 Privacy Protection MethodPoisoningCommunication Efficiency 2024.05.14 2025.05.27 Literature Database
Privacy-Preserving Edge Federated Learning for Intelligent Mobile-Health Systems Authors: Amin Aminifar, Matin Shokri, Amir Aminifar | Published: 2024-05-09 | Updated: 2024-09-13 Edge ComputingPrivacy Protection MethodCommunication Efficiency 2024.05.09 2025.05.27 Literature Database
Model Inversion Robustness: Can Transfer Learning Help? Authors: Sy-Tuyen Ho, Koh Jun Hao, Keshigeyan Chandrasegaran, Ngoc-Bao Nguyen, Ngai-Man Cheung | Published: 2024-05-09 Privacy Protection MethodMembership InferenceDefense Method 2024.05.09 2025.05.27 Literature Database