You Can’t Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality Authors: Pier Paolo Tricomi, Federica Nenna, Luca Pajola, Mauro Conti, Luciano Gamberini | Published: 2022-09-22 Dataset GenerationPrivacy AssessmentUser Authentication System 2022.09.22 2025.05.28 Literature Database
Bayesian Estimation of Differential Privacy Authors: Santiago Zanella-Béguelin, Lukas Wutschitz, Shruti Tople, Ahmed Salem, Victor Rühle, Andrew Paverd, Mohammad Naseri, Boris Köpf, Daniel Jones | Published: 2022-06-10 | Updated: 2022-06-15 Privacy AssessmentBayesian SecurityDeep Learning Method 2022.06.10 2025.05.28 Literature Database
Muffliato: Peer-to-Peer Privacy Amplification for Decentralized Optimization and Averaging Authors: Edwige Cyffers, Mathieu Even, Aurélien Bellet, Laurent Massoulié | Published: 2022-06-10 | Updated: 2024-06-11 Graph ConstructionPrivacy AssessmentCommunication Model 2022.06.10 2025.05.28 Literature Database
A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning Authors: Alberto Blanco-Justicia, David Sanchez, Josep Domingo-Ferrer, Krishnamurty Muralidhar | Published: 2022-06-09 | Updated: 2022-07-05 Privacy AssessmentImpact of GeneralizationAdversarial Example 2022.06.09 2025.05.28 Literature Database
Analytical Composition of Differential Privacy via the Edgeworth Accountant Authors: Hua Wang, Sheng Gao, Huanyu Zhang, Milan Shen, Weijie J. Su | Published: 2022-06-09 Privacy AssessmentFederated LearningFunction Definition 2022.06.09 2025.05.28 Literature Database
Rate Distortion Tradeoff in Private Read Update Write in Federated Submodel Learning Authors: Sajani Vithana, Sennur Ulukus | Published: 2022-06-07 Data Management SystemPrivacy AssessmentFederated Learning 2022.06.07 2025.05.28 Literature Database
Group privacy for personalized federated learning Authors: Filippo Galli, Sayan Biswas, Kangsoo Jung, Tommaso Cucinotta, Catuscia Palamidessi | Published: 2022-06-07 | Updated: 2022-09-04 Privacy AssessmentPoisoningFederated Learning 2022.06.07 2025.05.28 Literature Database
Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes? Authors: Huiyu Li, Nicholas Ayache, Hervé Delingette | Published: 2022-06-07 Attack Methods against DFLPrivacy AssessmentMembership Inference 2022.06.07 2025.05.28 Literature Database
Defense Against Gradient Leakage Attacks via Learning to Obscure Data Authors: Yuxuan Wan, Han Xu, Xiaorui Liu, Jie Ren, Wenqi Fan, Jiliang Tang | Published: 2022-06-01 Attack Methods against DFLPrivacy AssessmentPoisoning 2022.06.01 2025.05.28 Literature Database
Federated Learning in Non-IID Settings Aided by Differentially Private Synthetic Data Authors: Huancheng Chen, Haris Vikalo | Published: 2022-06-01 | Updated: 2023-04-20 Training ProtocolPrivacy AssessmentPoisoning 2022.06.01 2025.05.28 Literature Database