Privacy Technique

Partially Encrypted Machine Learning using Functional Encryption

Authors: Theo Ryffel, Edouard Dufour-Sans, Romain Gay, Francis Bach, David Pointcheval | Published: 2019-05-24 | Updated: 2021-09-23
Privacy Technique
Model Performance Evaluation
Adversarial Learning

Reconstruction of Privacy-Sensitive Data from Protected Templates

Authors: Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-08
Privacy Technique
Reconstruction Attack
Factors of Performance Degradation

Privacy-Preserving Deep Neural Networks with Pixel-based Image Encryption Considering Data Augmentation in the Encrypted Domain

Authors: Warit Sirichotedumrong, Takahiro Maekawa, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-05-06
Privacy Technique
Data Augmentation in Encrypted Domains
Privacy Protection in Machine Learning

Locally Differentially Private Naive Bayes Classification

Authors: Emre Yilmaz, Mohammad Al-Rubaie, J. Morris Chang | Published: 2019-05-03
Privacy Technique
Machine Learning
Dimensionality Reduction Method

Performing Co-Membership Attacks Against Deep Generative Models

Authors: Kin Sum Liu, Chaowei Xiao, Bo Li, Jie Gao | Published: 2018-05-24 | Updated: 2019-09-20
Privacy Technique
Membership Inference
Deep Learning Model

Generating Artificial Data for Private Deep Learning

Authors: Aleksei Triastcyn, Boi Faltings | Published: 2018-03-08 | Updated: 2019-04-28
Privacy Technique
Certified Robustness
Differential Privacy

Scalable Private Learning with PATE

Authors: Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Úlfar Erlingsson | Published: 2018-02-24
Privacy Technique
Differential Privacy
Distance Recovery Algorithm

Context-Aware Generative Adversarial Privacy

Authors: Chong Huang, Peter Kairouz, Xiao Chen, Lalitha Sankar, Ram Rajagopal | Published: 2017-10-26 | Updated: 2017-12-03
Gaussian Mixture Model
Privacy Technique
Anonymization Technology

Desensitized RDCA Subspaces for Compressive Privacy in Machine Learning

Authors: Artur Filipowicz, Thee Chanyaswad, S. Y. Kung | Published: 2017-07-24
Data Origins and Evolution
Privacy Enhancing Technology
Privacy Technique