Privacy Technique

Privacy accounting $\varepsilon$conomics: Improving differential privacy composition via a posteriori bounds

Authors: Valentin Hartmann, Vincent Bindschaedler, Alexander Bentkamp, Robert West | Published: 2022-05-06 | Updated: 2023-06-19
ODP Analysis
Privacy Technique
Privacy Assessment

Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning

Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen | Published: 2021-07-26 | Updated: 2021-11-02
Privacy Technique
Model Architecture
Machine Learning Application

Exploiting Explanations for Model Inversion Attacks

Authors: Xuejun Zhao, Wencan Zhang, Xiaokui Xiao, Brian Y. Lim | Published: 2021-04-26 | Updated: 2022-03-14
XAI (Explainable AI)
Privacy Technique
Model Inversion

Efficient Quantification of Profile Matching Risk in Social Networks

Authors: Anisa Halimi, Erman Ayday | Published: 2020-09-07
Attack that Analyzes Information Collected from Social Media to Identify Individuals using AI
Privacy Technique
Profile Matching

Tempered Sigmoid Activations for Deep Learning with Differential Privacy

Authors: Nicolas Papernot, Abhradeep Thakurta, Shuang Song, Steve Chien, Úlfar Erlingsson | Published: 2020-07-28
Privacy Technique
Differential Privacy
Adjustment of Activation Functions

An Overview of Privacy in Machine Learning

Authors: Emiliano De Cristofaro | Published: 2020-05-18
Privacy Technique
Membership Inference
Machine Learning Method

On the (Un)Reliability of Privacy Policies in Android Apps

Authors: Luca Verderame, Davide Caputo, Andrea Romdhana, Alessio Merlo | Published: 2020-04-18
Privacy Technique
Dynamic Analysis Method
Machine Learning

Partially Encrypted Machine Learning using Functional Encryption

Authors: Theo Ryffel, Edouard Dufour-Sans, Romain Gay, Francis Bach, David Pointcheval | Published: 2019-05-24 | Updated: 2021-09-23
Privacy Technique
Model Performance Evaluation
Adversarial Learning

Reconstruction of Privacy-Sensitive Data from Protected Templates

Authors: Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-08
Privacy Technique
Reconstruction Attack
Factors of Performance Degradation

Privacy-Preserving Deep Neural Networks with Pixel-based Image Encryption Considering Data Augmentation in the Encrypted Domain

Authors: Warit Sirichotedumrong, Takahiro Maekawa, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-05-06
Privacy Technique
Data Augmentation in Encrypted Domains
Privacy Protection in Machine Learning