Differentially Private Federated Learning: A Systematic Review Authors: Jie Fu, Yuan Hong, Xinpeng Ling, Leixia Wang, Xun Ran, Zhiyu Sun, Wendy Hui Wang, Zhili Chen, Yang Cao | Published: 2024-05-14 | Updated: 2024-05-20 Privacy Protection MethodPoisoningCommunication Efficiency 2024.05.14 2025.05.27 Literature Database
Privacy-Preserving Edge Federated Learning for Intelligent Mobile-Health Systems Authors: Amin Aminifar, Matin Shokri, Amir Aminifar | Published: 2024-05-09 | Updated: 2024-09-13 Edge ComputingPrivacy Protection MethodCommunication Efficiency 2024.05.09 2025.05.27 Literature Database
Model Inversion Robustness: Can Transfer Learning Help? Authors: Sy-Tuyen Ho, Koh Jun Hao, Keshigeyan Chandrasegaran, Ngoc-Bao Nguyen, Ngai-Man Cheung | Published: 2024-05-09 Privacy Protection MethodMembership InferenceDefense Method 2024.05.09 2025.05.27 Literature Database
Differentially Private Post-Processing for Fair Regression Authors: Ruicheng Xian, Qiaobo Li, Gautam Kamath, Han Zhao | Published: 2024-05-07 WatermarkingPrivacy Protection MethodFairness evaluation 2024.05.07 2025.05.27 Literature Database
Locally Differentially Private In-Context Learning Authors: Chunyan Zheng, Keke Sun, Wenhao Zhao, Haibo Zhou, Lixin Jiang, Shaoyang Song, Chunlai Zhou | Published: 2024-05-07 | Updated: 2024-05-08 WatermarkingPrivacy Protection MethodPrompt Injection 2024.05.07 2025.05.27 Literature Database
IPFed: Identity protected federated learning for user authentication Authors: Yosuke Kaga, Yusei Suzuki, Kenta Takahashi | Published: 2024-05-07 Privacy Protection MethodMembership InferenceFace Recognition System 2024.05.07 2025.05.27 Literature Database
The Federation Strikes Back: A Survey of Federated Learning Privacy Attacks, Defenses, Applications, and Policy Landscape Authors: Joshua C. Zhao, Saurabh Bagchi, Salman Avestimehr, Kevin S. Chan, Somali Chaterji, Dimitris Dimitriadis, Jiacheng Li, Ninghui Li, Arash Nourian, Holger R. Roth | Published: 2024-05-06 | Updated: 2025-03-22 Privacy Protection MethodPoisoningMembership Inference 2024.05.06 2025.05.27 Literature Database
ATTAXONOMY: Unpacking Differential Privacy Guarantees Against Practical Adversaries Authors: Rachel Cummings, Shlomi Hod, Jayshree Sarathy, Marika Swanberg | Published: 2024-05-02 Privacy Protection MethodReconstruction DurabilityWatermark Robustness 2024.05.02 2025.05.27 Literature Database
Evaluations of Machine Learning Privacy Defenses are Misleading Authors: Michael Aerni, Jie Zhang, Florian Tramèr | Published: 2024-04-26 | Updated: 2024-09-05 Privacy Protection MethodMembership InferenceAdversarial Example 2024.04.26 2025.05.27 Literature Database
OmniLytics+: A Secure, Efficient, and Affordable Blockchain Data Market for Machine Learning through Off-Chain Processing Authors: Songze Li, Mingzhe Liu, Mengqi Chen | Published: 2024-04-17 WatermarkingPrivacy Protection MethodBlockchain Technology 2024.04.17 2025.05.27 Literature Database