Privacy-Preserving Machine Learning

TVineSynth: A Truncated C-Vine Copula Generator of Synthetic Tabular Data to Balance Privacy and Utility

Authors: Elisabeth Griesbauer, Claudia Czado, Arnoldo Frigessi, Ingrid Hobæk Haff | Published: 2025-03-20
Data Generation
Privacy-Preserving Machine Learning
Membership Inference

Zero-Knowledge Federated Learning: A New Trustworthy and Privacy-Preserving Distributed Learning Paradigm

Authors: Yuxin Jin, Taotao Wang, Qing Yang, Long Shi, Shengli Zhang | Published: 2025-03-18 | Updated: 2025-03-24
Client Contribution Assessment
Privacy-Preserving Machine Learning
Malicious Client

MOBIUS: Model-Oblivious Binarized Neural Networks

Authors: Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka | Published: 2018-11-29
Trigger Detection
Privacy-Preserving Machine Learning
Differential Privacy

VirtualIdentity: Privacy-Preserving User Profiling

Authors: Sisi Wang, Wing-Sea Poon, Golnoosh Farnadi, Caleb Horst, Kebra Thompson, Michael Nickels, Rafael Dowsley, Anderson C. A. Nascimento, Martine De Cock | Published: 2018-08-30
Privacy-Preserving Machine Learning
Feature Engineering
Secret Distributed Computation

Efficient Deep Learning on Multi-Source Private Data

Authors: Nick Hynes, Raymond Cheng, Dawn Song | Published: 2018-07-17
Privacy-Preserving Machine Learning
Differential Privacy
Deep Learning

Gradient-Leaks: Understanding and Controlling Deanonymization in Federated Learning

Authors: Tribhuvanesh Orekondy, Seong Joon Oh, Yang Zhang, Bernt Schiele, Mario Fritz | Published: 2018-05-15 | Updated: 2020-09-13
Privacy-Preserving Machine Learning
Poisoning
User Behavior Analysis

Stealing Hyperparameters in Machine Learning

Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2018-02-14 | Updated: 2019-09-07
Privacy-Preserving Machine Learning
Model Extraction Attack
Optimization Strategy

Blind De-anonymization Attacks using Social Networks

Authors: Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby Lee | Published: 2018-01-17
Attack that Analyzes Information Collected from Social Media to Identify Individuals using AI
Graph Representation Learning
Privacy-Preserving Machine Learning

Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification

Authors: Yi Wang, Jianwu Wan, Jun Guo, Yiu-Ming Cheung, Pong C Yuen | Published: 2017-11-05
Privacy-Preserving Machine Learning
Model Performance Evaluation
Biometric Key Generation

Elliptical modeling and pattern analysis for perturbation models and classfication

Authors: Shan Suthaharan, Weining Shen | Published: 2017-10-22
Data Privacy Assessment
Privacy-Preserving Machine Learning
Model evaluation methods