Privacy Protection

Trade-offs and Guarantees of Adversarial Representation Learning for Information Obfuscation

Authors: Han Zhao, Jianfeng Chi, Yuan Tian, Geoffrey J. Gordon | Published: 2019-06-19 | Updated: 2020-10-25
Privacy Protection
Membership Inference
Optimization Problem

Membership Privacy for Machine Learning Models Through Knowledge Transfer

Authors: Virat Shejwalkar, Amir Houmansadr | Published: 2019-06-15 | Updated: 2020-12-31
Privacy Protection
Attack Method
Knowledge Transferability

Real-Time Privacy-Preserving Data Release for Smart Meters

Authors: Mohammadhadi Shateri, Francisco Messina, Pablo Piantanida, Fabrice Labeau | Published: 2019-06-14 | Updated: 2021-11-25
Privacy Protection
Time Series Analysis
Non-Identical Dataset

Computing Tight Differential Privacy Guarantees Using FFT

Authors: Antti Koskela, Joonas Jälkö, Antti Honkela | Published: 2019-06-07 | Updated: 2019-11-04
Characteristics of RDP
Privacy Protection
Mathematical Foundations

Differential Privacy Has Disparate Impact on Model Accuracy

Authors: Eugene Bagdasaryan, Vitaly Shmatikov | Published: 2019-05-28 | Updated: 2019-10-27
Privacy Protection
Privacy Protection Method
Model Evaluation

Body Shape Privacy in Images: Understanding Privacy and Preventing Automatic Shape Extraction

Authors: Hosnieh Sattar, Katharina Krombholz, Gerard Pons-Moll, Mario Fritz | Published: 2019-05-27 | Updated: 2020-10-22
3D Shape Estimation Attack
Privacy Protection
Comfort of Image Sharing

Privacy-Enhancing Context Authentication from Location-Sensitive Data

Authors: Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas | Published: 2019-04-18 | Updated: 2019-07-10
Data Protection Method
Privacy Protection
Authentication Technology

When Homomorphic Cryptosystem Meets Differential Privacy: Training Machine Learning Classifier with Privacy Protection

Authors: Xiangyun Tang, Liehuang Zhu, Meng Shen, Xiaojiang Du | Published: 2018-12-06
Performance Evaluation
Privacy Protection
Differential Privacy

Dancing in the Dark: Private Multi-Party Machine Learning in an Untrusted Setting

Authors: Clement Fung, Jamie Koerner, Stewart Grant, Ivan Beschastnikh | Published: 2018-11-23 | Updated: 2019-02-24
Privacy Protection
Poisoning Attack
Model Extraction Attack

You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information

Authors: Beatrice Perez, Mirco Musolesi, Gianluca Stringhini | Published: 2018-03-27 | Updated: 2018-05-14
Privacy Protection
Feature Selection Method
Statistical Analysis