Privacy Enhancing Technology

Private Hierarchical Clustering and Efficient Approximation

Authors: Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos | Published: 2019-04-09 | Updated: 2021-10-01
Privacy Enhancing Technology
Encryption Technology
Hierarchical Clustering

Privacy-preserving Machine Learning through Data Obfuscation

Authors: Tianwei Zhang, Zecheng He, Ruby B. Lee | Published: 2018-07-05 | Updated: 2018-07-13
Privacy Enhancing Technology
Property Inference Attack
Model Extraction Attack

An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors

Authors: Joshua Allen, Bolin Ding, Janardhan Kulkarni, Harsha Nori, Olga Ohrimenko, Sergey Yekhanin | Published: 2018-07-02 | Updated: 2019-10-26
Algorithm
Privacy Enhancing Technology
Differential Privacy

Privacy Preserving Machine Learning: Threats and Solutions

Authors: Mohammad Al-Rubaie, J. Morris Chang | Published: 2018-03-27
Privacy Enhancing Technology
Dimensionality Reduction Method

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

Authors: Andreas Nautsch, Sergey Isadskiy, Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch | Published: 2018-03-09
Data Privacy Management
Privacy Enhancing Technology
Speech Recognition Process

Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid

Authors: Imtiaz Parvez, Maryamossadat Aghili, Arif Sarwat | Published: 2017-09-25
Privacy Enhancing Technology
Information Security
Anomaly Detection Method

Quantum Privacy-Preserving Perceptron

Authors: Shenggang Ying, Mingsheng Ying, Yuan Feng | Published: 2017-07-31
Privacy Enhancing Technology
Differential Privacy
Quantum Computing Method

Desensitized RDCA Subspaces for Compressive Privacy in Machine Learning

Authors: Artur Filipowicz, Thee Chanyaswad, S. Y. Kung | Published: 2017-07-24
Data Origins and Evolution
Privacy Enhancing Technology
Privacy Technique

Morpheo: Traceable Machine Learning on Hidden data

Authors: Mathieu Galtier, Camille Marini | Published: 2017-04-17
Privacy Enhancing Technology
Platform Architecture
Encryption Technology