dpart: Differentially Private Autoregressive Tabular, a General Framework for Synthetic Data Generation Authors: Sofiane Mahiou, Kai Xu, Georgi Ganev | Published: 2022-07-12 Algorithm DesignPrivacy ProtectionPrivacy Enhancing Technology 2022.07.12 2025.05.28 Literature Database
Federated and Transfer Learning: A Survey on Adversaries and Defense Mechanisms Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif | Published: 2022-07-05 Privacy ProtectionPoisoningDefense Method 2022.07.05 2025.05.28 Literature Database
Federated Split GANs Authors: Pranvera Kortoçi, Yilei Liang, Pengyuan Zhou, Lik-Hang Lee, Abbas Mehrabi, Pan Hui, Sasu Tarkoma, Jon Crowcroft | Published: 2022-07-04 Privacy ProtectionEfficiency of Distributed LearningChallenges of Generative Models 2022.07.04 2025.05.28 Literature Database
Scalable privacy-preserving cancer type prediction with homomorphic encryption Authors: Esha Sarkar, Eduardo Chielle, Gamze Gursoy, Leo Chen, Mark Gerstein, Michail Maniatakos | Published: 2022-04-12 Privacy ProtectionMatrix Multiplication Methodsevaluation metrics 2022.04.12 2025.05.28 Literature Database
SoK: Privacy Preserving Machine Learning using Functional Encryption: Opportunities and Challenges Authors: Prajwal Panzade, Daniel Takabi | Published: 2022-04-11 | Updated: 2022-09-02 WatermarkingPrivacy ProtectionPrivacy Protection in Machine Learning 2022.04.11 2025.05.28 Literature Database
Stability and Generalization of Differentially Private Minimax Problems Authors: Yilin Kang, Yong Liu, Jian Li, Weiping Wang | Published: 2022-04-11 | Updated: 2022-04-22 Privacy ProtectionGeneralization PerformanceLoss Function 2022.04.11 2025.05.28 Literature Database
HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection Authors: Mohanad Sarhan, Wai Weng Lo, Siamak Layeghy, Marius Portmann | Published: 2022-04-08 Smart ContractPrivacy ProtectionDistributed Learning 2022.04.08 2025.05.28 Literature Database
Distributed data analytics Authors: Richard Mortier, Hamed Haddadi, Sandra Servia, Liang Wang | Published: 2022-03-26 Backdoor AttackPrivacy ProtectionCommunication Model 2022.03.26 2025.05.28 Literature Database
MERLIN — Malware Evasion with Reinforcement LearnINg Authors: Tony Quertier, Benjamin Marais, Stéphane Morucci, Bertrand Fournel | Published: 2022-03-24 | Updated: 2022-03-30 Privacy ProtectionReinforcement Learning AlgorithmDefense Method 2022.03.24 2025.05.28 Literature Database
SoK: Differential Privacy on Graph-Structured Data Authors: Tamara T. Mueller, Dmitrii Usynin, Johannes C. Paetzold, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-17 Graph PrivacyPrivacy ProtectionPrivacy Analysis 2022.03.17 2025.05.28 Literature Database