TVineSynth: A Truncated C-Vine Copula Generator of Synthetic Tabular Data to Balance Privacy and Utility Authors: Elisabeth Griesbauer, Claudia Czado, Arnoldo Frigessi, Ingrid Hobæk Haff | Published: 2025-03-20 Data GenerationPrivacy-Preserving Machine LearningMembership Inference 2025.03.20 2025.05.27 Literature Database
Zero-Knowledge Federated Learning: A New Trustworthy and Privacy-Preserving Distributed Learning Paradigm Authors: Yuxin Jin, Taotao Wang, Qing Yang, Long Shi, Shengli Zhang | Published: 2025-03-18 | Updated: 2025-03-24 Client Contribution AssessmentPrivacy-Preserving Machine LearningMalicious Client 2025.03.18 2025.05.27 Literature Database
MOBIUS: Model-Oblivious Binarized Neural Networks Authors: Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka | Published: 2018-11-29 Trigger DetectionPrivacy-Preserving Machine LearningDifferential Privacy 2018.11.29 2025.05.28 Literature Database
VirtualIdentity: Privacy-Preserving User Profiling Authors: Sisi Wang, Wing-Sea Poon, Golnoosh Farnadi, Caleb Horst, Kebra Thompson, Michael Nickels, Rafael Dowsley, Anderson C. A. Nascimento, Martine De Cock | Published: 2018-08-30 Privacy-Preserving Machine LearningFeature EngineeringSecret Distributed Computation 2018.08.30 2025.05.28 Literature Database
Efficient Deep Learning on Multi-Source Private Data Authors: Nick Hynes, Raymond Cheng, Dawn Song | Published: 2018-07-17 Privacy-Preserving Machine LearningDifferential PrivacyDeep Learning 2018.07.17 2025.05.28 Literature Database
Gradient-Leaks: Understanding and Controlling Deanonymization in Federated Learning Authors: Tribhuvanesh Orekondy, Seong Joon Oh, Yang Zhang, Bernt Schiele, Mario Fritz | Published: 2018-05-15 | Updated: 2020-09-13 Privacy-Preserving Machine LearningPoisoningUser Behavior Analysis 2018.05.15 2025.05.28 Literature Database
Stealing Hyperparameters in Machine Learning Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2018-02-14 | Updated: 2019-09-07 Privacy-Preserving Machine LearningModel Extraction AttackOptimization Strategy 2018.02.14 2025.05.28 Literature Database
Blind De-anonymization Attacks using Social Networks Authors: Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby Lee | Published: 2018-01-17 Attack that Analyzes Information Collected from Social Media to Identify Individuals using AIGraph Representation LearningPrivacy-Preserving Machine Learning 2018.01.17 2025.05.28 Literature Database
Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification Authors: Yi Wang, Jianwu Wan, Jun Guo, Yiu-Ming Cheung, Pong C Yuen | Published: 2017-11-05 Privacy-Preserving Machine LearningModel Performance EvaluationBiometric Key Generation 2017.11.05 2025.05.28 Literature Database
Elliptical modeling and pattern analysis for perturbation models and classfication Authors: Shan Suthaharan, Weining Shen | Published: 2017-10-22 Data Privacy AssessmentPrivacy-Preserving Machine LearningModel evaluation methods 2017.10.22 2025.05.28 Literature Database