Protecting User Privacy in Remote Conversational Systems: A Privacy-Preserving framework based on text sanitization Authors: Zhigang Kan, Linbo Qiao, Hao Yu, Liwen Peng, Yifu Gao, Dongsheng Li | Published: 2023-06-14 Data Protection MethodPrivacy TechniqueInformation Extraction 2023.06.14 2025.05.28 Literature Database
Differentially Private One Permutation Hashing and Bin-wise Consistent Weighted Sampling Authors: Xiaoyun Li, Ping Li | Published: 2023-06-13 Data Privacy AssessmentData Protection MethodPrivacy Technique 2023.06.13 2025.05.28 Literature Database
“Private Prediction Strikes Back!” Private Kernelized Nearest Neighbors with Individual Renyi Filter Authors: Yuqing Zhu, Xuandong Zhao, Chuan Guo, Yu-Xiang Wang | Published: 2023-06-12 Data Privacy AssessmentHyperparameter TuningPrivacy Technique 2023.06.12 2025.05.28 Literature Database
Gaussian Membership Inference Privacy Authors: Tobias Leemann, Martin Pawelczyk, Gjergji Kasneci | Published: 2023-06-12 | Updated: 2023-10-26 Privacy TechniqueHypothesis TestingStatistical Testing 2023.06.12 2025.05.28 Literature Database
AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning Authors: Ghada Almashaqbeh, Zahra Ghodsi | Published: 2023-06-12 Privacy TechniqueMalicious ClientFederated Learning 2023.06.12 2025.05.28 Literature Database
Efficient Skip Connections Realization for Secure Inference on Encrypted Data Authors: Nir Drucker, Itamar Zimerman | Published: 2023-06-11 Privacy TechniqueReal-Time InferencePerformance Evaluation 2023.06.11 2025.05.28 Literature Database
Killing Two Birds with One Stone: Quantization Achieves Privacy in Distributed Learning Authors: Guangfeng Yan, Tan Li, Kui Wu, Linqi Song | Published: 2023-04-26 DNN IP Protection MethodTraining ProtocolPrivacy Technique 2023.04.26 2025.05.28 Literature Database
Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems Authors: Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Yi | Published: 2023-04-26 Privacy TechniqueBlockchain IntegrationMulti-Party Computation 2023.04.26 2025.05.28 Literature Database
Censoring chemical data to mitigate dual use risk Authors: Quintina L. Campbell, Jonathan Herington, Andrew D. White | Published: 2023-04-20 Data GenerationPrivacy TechniqueSafety Alignment 2023.04.20 2025.05.28 Literature Database
Sensitivity estimation for differentially private query processing Authors: Meifan Zhang, Xin Liu, Lihua Yin | Published: 2023-04-19 Sampling MethodPrivacy TechniqueStatistical Methods 2023.04.19 2025.05.28 Literature Database