Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms Authors: Mohsen Minaei, S Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate | Published: 2020-05-28 Data Protection MethodPrivacy AssessmentAdversarial Attack Methods 2020.05.28 2025.05.28 Literature Database
Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users Authors: Ferenc Béres, István András Seres, András A. Benczúr, Mikerah Quintyne-Collins | Published: 2020-05-28 | Updated: 2020-10-13 Transaction PrioritizationPrivacy AssessmentFraudulent Transaction 2020.05.28 2025.05.28 Literature Database
Efficient Privacy-Preserving Electricity Theft Detection with Dynamic Billing and Load Monitoring for AMI Networks Authors: Mohamed I. Ibrahem, Mahmoud Nabil, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Fawaz Alsolami | Published: 2020-05-28 Energy ManagementPrivacy AssessmentDynamic Pricing 2020.05.28 2025.05.28 Literature Database
COVID-19 and Your Smartphone: BLE-based Smart Contact Tracing Authors: Pai Chet Ng, Petros Spachos, Konstantinos Plataniotis | Published: 2020-05-28 Performance EvaluationPrivacy AssessmentMachine Learning 2020.05.28 2025.05.28 Literature Database
TIPRDC: Task-Independent Privacy-Respecting Data Crowdsourcing Framework for Deep Learning with Anonymized Intermediate Representations Authors: Ang Li, Yixiao Duan, Huanrui Yang, Yiran Chen, Jianlei Yang | Published: 2020-05-23 | Updated: 2020-08-25 Data Protection MethodPrivacy AssessmentFeature Extraction Method 2020.05.23 2025.05.28 Literature Database
Scalable Privacy-Preserving Distributed Learning Authors: David Froelicher, Juan R. Troncoso-Pastoriza, Apostolos Pyrgelis, Sinem Sav, Joao Sa Sousa, Jean-Philippe Bossuat, Jean-Pierre Hubaux | Published: 2020-05-19 | Updated: 2021-07-14 Privacy AssessmentMulti-Party ComputationCryptographic Protocol 2020.05.19 2025.05.28 Literature Database
FrameProv: Towards End-To-End Video Provenance Authors: Mansoor Ahmed-Rengers | Published: 2020-05-19 System RequirementsPrivacy AssessmentVideo Reliability Assurance 2020.05.19 2025.05.28 Literature Database
Towards Memory Safe Python Enclave for Security Sensitive Computation Authors: Huibo Wang, Mingshen Sun, Qian Feng, Pei Wang, Tongxin Li, Yu Ding | Published: 2020-05-12 Security AssurancePrivacy AssessmentVulnerability Assessment Method 2020.05.12 2025.05.28 Literature Database
A Secure Federated Learning Framework for 5G Networks Authors: Yi Liu, Jialiang Peng, Jiawen Kang, Abdullah M. Iliyasu, Dusit Niyato, Ahmed A. Abd El-Latif | Published: 2020-05-12 Secure AggregationPrivacy AssessmentFederated Learning System 2020.05.12 2025.05.28 Literature Database
Information-Theoretic Bounds on the Generalization Error and Privacy Leakage in Federated Learning Authors: Semih Yagli, Alex Dytso, H. Vincent Poor | Published: 2020-05-05 Privacy AssessmentPrivacy Protection in Machine LearningFederated Learning System 2020.05.05 2025.05.28 Literature Database