Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification Authors: Jialin Liu, Ning Miao, Chongzhou Fang, Houman Homayoun, Han Wang | Published: 2023-04-04 Cyber AttackPrivacy Enhancing TechnologyAttack Method 2023.04.04 2025.05.28 Literature Database
On Mitigating the Utility-Loss in Differentially Private Learning: A new Perspective by a Geometrically Inspired Kernel Approach Authors: Mohit Kumar, Bernhard A. Moser, Lukas Fischer | Published: 2023-04-03 | Updated: 2024-02-07 Privacy Enhancing TechnologyMachine Learning MethodRegularization 2023.04.03 2025.05.28 Literature Database
Score Attack: A Lower Bound Technique for Optimal Differentially Private Learning Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2023-03-13 Privacy Enhancing TechnologyRisk Assessment MethodConvergence Property 2023.03.13 2025.05.28 Literature Database
From Noisy Fixed-Point Iterations to Private ADMM for Centralized and Federated Learning Authors: Edwige Cyffers, Aurélien Bellet, Debabrota Basu | Published: 2023-02-24 | Updated: 2023-07-12 Privacy Enhancing TechnologyConvergence AnalysisFixed Point Iteration Method 2023.02.24 2025.05.28 Literature Database
Certified private data release for sparse Lipschitz functions Authors: Konstantin Donhauser, Johan Lokna, Amartya Sanyal, March Boedihardjo, Robert Hönig, Fanny Yang | Published: 2023-02-19 | Updated: 2023-08-28 WatermarkingPrivacy Enhancing TechnologyModel Performance Evaluation 2023.02.19 2025.05.28 Literature Database
Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data Authors: Pratik Karmakar, Debabrota Basu | Published: 2023-02-16 | Updated: 2023-10-18 Privacy Enhancing TechnologyModel Performance EvaluationModel Extraction Attack 2023.02.16 2025.05.28 Literature Database
Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset Distillation Authors: Noel Loo, Ramin Hasani, Mathias Lechner, Alexander Amini, Daniela Rus | Published: 2023-02-02 | Updated: 2023-11-09 Privacy Enhancing TechnologyModel Performance EvaluationReconstruction Durability 2023.02.02 2025.05.28 Literature Database
On the Efficacy of Differentially Private Few-shot Image Classification Authors: Marlon Tobaben, Aliaksandra Shysheya, John Bronskill, Andrew Paverd, Shruti Tople, Santiago Zanella-Beguelin, Richard E Turner, Antti Honkela | Published: 2023-02-02 | Updated: 2023-12-19 Few-Shot LearningPrivacy Enhancing TechnologyModel Performance Evaluation 2023.02.02 2025.05.28 Literature Database
Privacy Preserving Ultra-Short-term Wind Power Prediction Based on Secure Multi Party Computation Authors: Hang Fan, Xiaoyu Fan, Tianyi Hao, Wei Wei, Kun Chen, Guosai Wang, Xiaofeng Jia, Yidong Li, Wei Xu | Published: 2023-01-31 Privacy Enhancing TechnologyParticipant Selection MethodDecision Tree 2023.01.31 2025.05.28 Literature Database
Practical Differentially Private Hyperparameter Tuning with Subsampling Authors: Antti Koskela, Tejas Kulkarni | Published: 2023-01-27 | Updated: 2024-02-13 WatermarkingPrivacy Enhancing TechnologyOptimization Problem 2023.01.27 2025.05.28 Literature Database