Mobile Augmented Reality with Federated Learning in the Metaverse Authors: Xinyu Zhou, Jun Zhao | Published: 2022-12-16 | Updated: 2023-11-07 Data CollectionPrivacy Enhancing TechnologyOptimization Methods 2022.12.16 2025.05.28 Literature Database
Do you pay for Privacy in Online learning? Authors: Amartya Sanyal, Giorgia Ramponi | Published: 2022-10-10 Online LearningPrivacy Enhancing Technology 2022.10.10 2025.05.28 Literature Database
mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web Applications Authors: David Monschein, Oliver P. Waldhorst | Published: 2022-10-07 Privacy Enhancing TechnologyUser Behavior AnalysisThreat Model 2022.10.07 2025.05.28 Literature Database
Data Provenance via Differential Auditing Authors: Xin Mu, Ming Pang, Feida Zhu | Published: 2022-09-04 Data Origins and EvolutionPrivacy Enhancing TechnologyModel Performance Evaluation 2022.09.04 2025.05.28 Literature Database
Exploiting Fairness to Enhance Sensitive Attributes Reconstruction Authors: Julien Ferry, Ulrich Aïvodji, Sébastien Gambs, Marie-José Huguet, Mohamed Siala | Published: 2022-09-02 Privacy Enhancing TechnologyExperimental ValidationAdversarial Attack Methods 2022.09.02 2025.05.28 Literature Database
MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning Authors: Hua Ma, Qun Li, Yifeng Zheng, Zhi Zhang, Xiaoning Liu, Yansong Gao, Said F. Al-Sarawi, Derek Abbott | Published: 2022-07-19 Attack Methods against DFLPrivacy Enhancing TechnologyPoisoning 2022.07.19 2025.05.28 Literature Database
dpart: Differentially Private Autoregressive Tabular, a General Framework for Synthetic Data Generation Authors: Sofiane Mahiou, Kai Xu, Georgi Ganev | Published: 2022-07-12 Algorithm DesignPrivacy ProtectionPrivacy Enhancing Technology 2022.07.12 2025.05.28 Literature Database
Fusion: Efficient and Secure Inference Resilient to Malicious Servers Authors: Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu | Published: 2022-05-06 | Updated: 2023-06-10 Privacy Enhancing TechnologyAttack MethodCommunication Efficiency 2022.05.06 2025.05.28 Literature Database
Provably Confidential Language Modelling Authors: Xuandong Zhao, Lei Li, Yu-Xiang Wang | Published: 2022-05-04 | Updated: 2022-06-23 Group ConfidentialityPrivacy Enhancing TechnologyPrivacy Assessment 2022.05.04 2025.05.28 Literature Database
Universal Optimality and Robust Utility Bounds for Metric Differential Privacy Authors: Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Ming Ding | Published: 2022-05-03 Privacy Enhancing TechnologyPrivacy AnalysisLoss Function 2022.05.03 2025.05.28 Literature Database