Private Hierarchical Clustering and Efficient Approximation Authors: Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos | Published: 2019-04-09 | Updated: 2021-10-01 Privacy Enhancing TechnologyEncryption TechnologyHierarchical Clustering 2019.04.09 2025.05.28 Literature Database
Privacy-preserving Machine Learning through Data Obfuscation Authors: Tianwei Zhang, Zecheng He, Ruby B. Lee | Published: 2018-07-05 | Updated: 2018-07-13 Privacy Enhancing TechnologyProperty Inference AttackModel Extraction Attack 2018.07.05 2025.05.28 Literature Database
An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors Authors: Joshua Allen, Bolin Ding, Janardhan Kulkarni, Harsha Nori, Olga Ohrimenko, Sergey Yekhanin | Published: 2018-07-02 | Updated: 2019-10-26 AlgorithmPrivacy Enhancing TechnologyDifferential Privacy 2018.07.02 2025.05.28 Literature Database
Privacy Preserving Machine Learning: Threats and Solutions Authors: Mohammad Al-Rubaie, J. Morris Chang | Published: 2018-03-27 Privacy Enhancing TechnologyDimensionality Reduction Method 2018.03.27 2025.05.28 Literature Database
Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters Authors: Andreas Nautsch, Sergey Isadskiy, Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch | Published: 2018-03-09 Data Privacy ManagementPrivacy Enhancing TechnologySpeech Recognition Process 2018.03.09 2025.05.28 Literature Database
Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid Authors: Imtiaz Parvez, Maryamossadat Aghili, Arif Sarwat | Published: 2017-09-25 Privacy Enhancing TechnologyInformation SecurityAnomaly Detection Method 2017.09.25 2025.05.28 Literature Database
Quantum Privacy-Preserving Perceptron Authors: Shenggang Ying, Mingsheng Ying, Yuan Feng | Published: 2017-07-31 Privacy Enhancing TechnologyDifferential PrivacyQuantum Computing Method 2017.07.31 2025.05.28 Literature Database
Desensitized RDCA Subspaces for Compressive Privacy in Machine Learning Authors: Artur Filipowicz, Thee Chanyaswad, S. Y. Kung | Published: 2017-07-24 Data Origins and EvolutionPrivacy Enhancing TechnologyPrivacy Technique 2017.07.24 2025.05.28 Literature Database
Morpheo: Traceable Machine Learning on Hidden data Authors: Mathieu Galtier, Camille Marini | Published: 2017-04-17 Privacy Enhancing TechnologyPlatform ArchitectureEncryption Technology 2017.04.17 2025.05.28 Literature Database