DPack: Efficiency-Oriented Privacy Budget Scheduling Authors: Pierre Tholoniat, Kelly Kostopoulou, Mosharaf Chowdhury, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer, Junfeng Yang | Published: 2022-12-26 | Updated: 2024-10-10 Scheduling MethodPrivacy Enhancing TechnologyOptimization Methods 2022.12.26 2025.05.28 Literature Database
SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning Authors: Ahmed Salem, Giovanni Cherubin, David Evans, Boris Köpf, Andrew Paverd, Anshuman Suri, Shruti Tople, Santiago Zanella-Béguelin | Published: 2022-12-21 | Updated: 2023-04-20 Data Privacy AssessmentPrivacy Enhancing TechnologyMembership Inference 2022.12.21 2025.05.28 Literature Database
Learned Systems Security Authors: Roei Schuster, Jin Peng Zhou, Thorsten Eisenhofer, Paul Grubbs, Nicolas Papernot | Published: 2022-12-20 | Updated: 2023-01-10 Backdoor AttackPrivacy Enhancing TechnologyPoisoning 2022.12.20 2025.05.28 Literature Database
Mobile Augmented Reality with Federated Learning in the Metaverse Authors: Xinyu Zhou, Jun Zhao | Published: 2022-12-16 | Updated: 2023-11-07 Data CollectionPrivacy Enhancing TechnologyOptimization Methods 2022.12.16 2025.05.28 Literature Database
Do you pay for Privacy in Online learning? Authors: Amartya Sanyal, Giorgia Ramponi | Published: 2022-10-10 Online LearningPrivacy Enhancing Technology 2022.10.10 2025.05.28 Literature Database
mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web Applications Authors: David Monschein, Oliver P. Waldhorst | Published: 2022-10-07 Privacy Enhancing TechnologyUser Behavior AnalysisThreat Model 2022.10.07 2025.05.28 Literature Database
Data Provenance via Differential Auditing Authors: Xin Mu, Ming Pang, Feida Zhu | Published: 2022-09-04 Data Origins and EvolutionPrivacy Enhancing TechnologyModel Performance Evaluation 2022.09.04 2025.05.28 Literature Database
Exploiting Fairness to Enhance Sensitive Attributes Reconstruction Authors: Julien Ferry, Ulrich Aïvodji, Sébastien Gambs, Marie-José Huguet, Mohamed Siala | Published: 2022-09-02 Privacy Enhancing TechnologyExperimental ValidationAdversarial Attack Methods 2022.09.02 2025.05.28 Literature Database
MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning Authors: Hua Ma, Qun Li, Yifeng Zheng, Zhi Zhang, Xiaoning Liu, Yansong Gao, Said F. Al-Sarawi, Derek Abbott | Published: 2022-07-19 Attack Methods against DFLPrivacy Enhancing TechnologyPoisoning 2022.07.19 2025.05.28 Literature Database
dpart: Differentially Private Autoregressive Tabular, a General Framework for Synthetic Data Generation Authors: Sofiane Mahiou, Kai Xu, Georgi Ganev | Published: 2022-07-12 Algorithm DesignPrivacy ProtectionPrivacy Enhancing Technology 2022.07.12 2025.05.28 Literature Database