Local Differential Privacy for Deep Learning Authors: M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe, M. Atiquzzaman | Published: 2019-08-08 | Updated: 2019-11-09 Privacy Enhancing TechnologyPrompt InjectionPrivacy Protection in Machine Learning 2019.08.08 2025.05.28 Literature Database
Optimal Attacks on Reinforcement Learning Policies Authors: Alessio Russo, Alexandre Proutiere | Published: 2019-07-31 Privacy Enhancing TechnologyAdversarial TrainingDeep Reinforcement Learning 2019.07.31 2025.05.28 Literature Database
Making AI Forget You: Data Deletion in Machine Learning Authors: Antonio Ginart, Melody Y. Guan, Gregory Valiant, James Zou | Published: 2019-07-11 | Updated: 2019-11-04 Data Deletion AlgorithmPrivacy Enhancing TechnologyMachine learning 2019.07.11 2025.05.28 Literature Database
Quantifying the Privacy Risks of Learning High-Dimensional Graphical Models Authors: Sasi Kumar Murakonda, Reza Shokri, George Theodorakopoulos | Published: 2019-05-29 | Updated: 2021-02-17 Privacy Enhancing TechnologyMembership InferenceInformation-Theoretic Evaluation 2019.05.29 2025.05.28 Literature Database
Private Hierarchical Clustering and Efficient Approximation Authors: Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos | Published: 2019-04-09 | Updated: 2021-10-01 Privacy Enhancing TechnologyEncryption TechnologyHierarchical Clustering 2019.04.09 2025.05.28 Literature Database
Privacy-preserving Machine Learning through Data Obfuscation Authors: Tianwei Zhang, Zecheng He, Ruby B. Lee | Published: 2018-07-05 | Updated: 2018-07-13 Privacy Enhancing TechnologyProperty Inference AttackModel Extraction Attack 2018.07.05 2025.05.28 Literature Database
An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors Authors: Joshua Allen, Bolin Ding, Janardhan Kulkarni, Harsha Nori, Olga Ohrimenko, Sergey Yekhanin | Published: 2018-07-02 | Updated: 2019-10-26 AlgorithmPrivacy Enhancing TechnologyDifferential Privacy 2018.07.02 2025.05.28 Literature Database
Privacy Preserving Machine Learning: Threats and Solutions Authors: Mohammad Al-Rubaie, J. Morris Chang | Published: 2018-03-27 Privacy Enhancing TechnologyDimensionality Reduction Method 2018.03.27 2025.05.28 Literature Database
Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters Authors: Andreas Nautsch, Sergey Isadskiy, Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch | Published: 2018-03-09 Data Privacy ManagementPrivacy Enhancing TechnologySpeech Recognition Process 2018.03.09 2025.05.28 Literature Database
Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid Authors: Imtiaz Parvez, Maryamossadat Aghili, Arif Sarwat | Published: 2017-09-25 Privacy Enhancing TechnologyInformation SecurityAnomaly Detection Method 2017.09.25 2025.05.28 Literature Database