Privacy Protection Method

A Systematic and Formal Study of the Impact of Local Differential Privacy on Fairness: Preliminary Results

Authors: Karima Makhlouf, Tamara Stefanovic, Heber H. Arcolezi, Catuscia Palamidessi | Published: 2024-05-23
Bias
Privacy Protection
Privacy Protection Method

Tighter Privacy Auditing of DP-SGD in the Hidden State Threat Model

Authors: Tudor Cebere, Aurélien Bellet, Nicolas Papernot | Published: 2024-05-23 | Updated: 2024-10-14
Data Privacy Assessment
Privacy Protection Method
Membership Inference

Federated Domain-Specific Knowledge Transfer on Large Language Models Using Synthetic Data

Authors: Haoran Li, Xinyuan Zhao, Dadi Guo, Hanlin Gu, Ziqian Zeng, Yuxing Han, Yangqiu Song, Lixin Fan, Qiang Yang | Published: 2024-05-23
Few-Shot Learning
Dataset Generation
Privacy Protection Method

Naturally Private Recommendations with Determinantal Point Processes

Authors: Jack Fitzsimons, Agustín Freitas Pasqualini, Robert Pisarczyk, Dmitrii Usynin | Published: 2024-05-22
Watermarking
Privacy Protection Method
Watermark Evaluation

Uncertainty quantification by block bootstrap for differentially private stochastic gradient descent

Authors: Holger Dette, Carina Graw | Published: 2024-05-21
Simulation Result Evaluation
Privacy Protection Method
Optimization Problem

The Effect of Quantization in Federated Learning: A Rényi Differential Privacy Perspective

Authors: Tianqu Kang, Lumin Liu, Hengtao He, Jun Zhang, S. H. Song, Khaled B. Letaief | Published: 2024-05-16
Privacy Protection
Privacy Protection Method
Quantization and Privacy

Learnable Privacy Neurons Localization in Language Models

Authors: Ruizhe Chen, Tianxiang Hu, Yang Feng, Zuozhu Liu | Published: 2024-05-16
LLM Security
Privacy Protection Method
Membership Inference

Differentially Private Federated Learning: A Systematic Review

Authors: Jie Fu, Yuan Hong, Xinpeng Ling, Leixia Wang, Xun Ran, Zhiyu Sun, Wendy Hui Wang, Zhili Chen, Yang Cao | Published: 2024-05-14 | Updated: 2024-05-20
Privacy Protection Method
Poisoning
Communication Efficiency

Privacy-Preserving Edge Federated Learning for Intelligent Mobile-Health Systems

Authors: Amin Aminifar, Matin Shokri, Amir Aminifar | Published: 2024-05-09 | Updated: 2024-09-13
Edge Computing
Privacy Protection Method
Communication Efficiency

Model Inversion Robustness: Can Transfer Learning Help?

Authors: Sy-Tuyen Ho, Koh Jun Hao, Keshigeyan Chandrasegaran, Ngoc-Bao Nguyen, Ngai-Man Cheung | Published: 2024-05-09
Privacy Protection Method
Membership Inference
Defense Method