Privacy Technique

AI Product Security: A Primer for Developers

Authors: Ebenezer R. H. P. Isaac, Jim Reno | Published: 2023-04-18
Security Analysis
Privacy Technique
Compliance with Ethical Guidelines

Crossing Roads of Federated Learning and Smart Grids: Overview, Challenges, and Perspectives

Authors: Hafsa Bousbiat, Roumaysa Bousselidj, Yassine Himeur, Abbes Amira, Faycal Bensaali, Fodil Fadli, Wathiq Mansoor, Wilfried Elmenreich | Published: 2023-04-17
Energy-Based Model
Security Analysis
Privacy Technique

A Randomized Approach for Tight Privacy Accounting

Authors: Jiachen T. Wang, Saeed Mahloujifar, Tong Wu, Ruoxi Jia, Prateek Mittal | Published: 2023-04-17 | Updated: 2023-11-21
Privacy Analysis
Privacy Technique
Statistical Methods

Zero-Knowledge Proof-based Practical Federated Learning on Blockchain

Authors: Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar | Published: 2023-04-12 | Updated: 2023-04-24
Watermarking
Security Analysis
Privacy Technique

Privacy-Preserving Matrix Factorization for Recommendation Systems using Gaussian Mechanism

Authors: Sohan Salahuddin Mugdho, Hafiz Imtiaz | Published: 2023-04-11
Watermarking
Privacy Analysis
Privacy Technique

RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense

Authors: Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu | Published: 2023-04-11
Trade-off Analysis
Privacy Technique
Poisoning

Balancing Privacy and Performance for Private Federated Learning Algorithms

Authors: Xiangjian Hou, Sarit Khirirat, Mohammad Yaqub, Samuel Horvath | Published: 2023-04-11 | Updated: 2023-08-18
Privacy Technique
Poisoning
Optimization Methods

Reinforcement Learning-Based Black-Box Model Inversion Attacks

Authors: Gyojin Han, Jaehyun Choi, Haeil Lee, Junmo Kim | Published: 2023-04-10
DNN IP Protection Method
Privacy Technique
Challenges of Generative Models

Gradient Sparsification for Efficient Wireless Federated Learning with Differential Privacy

Authors: Kang Wei, Jun Li, Chuan Ma, Ming Ding, Feng Shu, Haitao Zhao, Wen Chen, Hongbo Zhu | Published: 2023-04-09 | Updated: 2023-12-21
Client Clustering
Privacy Technique
Optimization Problem

Does Prompt-Tuning Language Model Ensure Privacy?

Authors: Shangyu Xie, Wei Dai, Esha Ghosh, Sambuddha Roy, Dan Schwartz, Kim Laine | Published: 2023-04-07 | Updated: 2023-04-15
Privacy Analysis
Privacy Technique
Attack Evaluation