Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning Authors: Tanveer Khan, Khoa Nguyen, Antonis Michalas | Published: 2023-01-20 DNN IP Protection MethodIntegration of FL and HEPrivacy Enhancing Technology 2023.01.20 2025.05.28 Literature Database
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data Authors: Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso | Published: 2023-01-18 | Updated: 2024-03-13 Privacy Enhancing TechnologyUser Authentication SystemSelf-Attention Mechanism 2023.01.18 2025.05.28 Literature Database
Command Line Interface Risk Modeling Authors: Dr Anthony L. Faulds | Published: 2023-01-17 Privacy Enhancing TechnologyModel Performance EvaluationFeature Importance Analysis 2023.01.17 2025.05.28 Literature Database
Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2023-01-09 | Updated: 2023-04-12 DNN IP Protection MethodPrivacy Enhancing TechnologyPoisoning 2023.01.09 2025.05.28 Literature Database
Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection Authors: Jordan Samhi, Maria Kober, Abdoul Kader Kabore, Steven Arzt, Tegawendé F. Bissyandé, Jacques Klein | Published: 2023-01-09 | Updated: 2023-01-11 Data Privacy AssessmentPrivacy Enhancing TechnologyProgram Analysis 2023.01.09 2025.05.28 Literature Database
Introducing Model Inversion Attacks on Automatic Speaker Recognition Authors: Karla Pizzi, Franziska Boenisch, Ugur Sahin, Konstantin Böttinger | Published: 2023-01-09 Privacy Enhancing TechnologyMembership InferenceSpeech Synthesis Technology 2023.01.09 2025.05.28 Literature Database
IronForge: An Open, Secure, Fair, Decentralized Federated Learning Authors: Guangsheng Yu, Xu Wang, Caijun Sun, Qin Wang, Ping Yu, Wei Ni, Ren Ping Liu, Xiwei Xu | Published: 2023-01-07 Privacy Enhancing TechnologyPrompt InjectionReward Mechanism Design 2023.01.07 2025.05.28 Literature Database
Privacy and Efficiency of Communications in Federated Split Learning Authors: Zongshun Zhang, Andrea Pinto, Valeria Turina, Flavio Esposito, Ibrahim Matta | Published: 2023-01-04 | Updated: 2023-01-07 DNN IP Protection MethodPrivacy Enhancing TechnologyOptimization Methods 2023.01.04 2025.05.28 Literature Database
Ranking Differential Privacy Authors: Shirong Xu, Will Wei Sun, Guang Cheng | Published: 2023-01-02 Privacy Enhancing TechnologyOptimization MethodsStatistical Methods 2023.01.02 2025.05.28 Literature Database
Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain Authors: Vesal Ahsani, Ali Rahimi, Mehdi Letafati, Babak Hossein Khalaj | Published: 2023-01-01 | Updated: 2023-01-11 Backdoor AttackPrivacy Enhancing TechnologyBlockchain Integration 2023.01.01 2025.05.28 Literature Database