How to Use Heuristics for Differential Privacy Authors: Seth Neel, Aaron Roth, Zhiwei Steven Wu | Published: 2018-11-19 Synthetic Data GenerationDifferential PrivacySelection and Evaluation of Optimization Algorithms 2018.11.19 2025.05.28 Literature Database
A Marauder’s Map of Security and Privacy in Machine Learning Authors: Nicolas Papernot | Published: 2018-11-03 Challenges in IT SecurityQuantification of UncertaintyDifferential Privacy 2018.11.03 2025.05.28 Literature Database
Privacy-Preserving Multiparty Learning For Logistic Regression Authors: Wei Du, Ang Li, Qinghua Li | Published: 2018-10-04 Secure Logistic RegressionPrivacy Risk ManagementDifferential Privacy 2018.10.04 2025.05.28 Literature Database
Privacy-Preserving Deep Learning via Weight Transmission Authors: Le Trieu Phong, Tran Thi Phuong | Published: 2018-09-10 | Updated: 2019-02-12 Model Extraction AttackDistributed Learning PlatformDifferential Privacy 2018.09.10 2025.05.28 Literature Database
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection Authors: Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren | Published: 2018-08-10 | Updated: 2021-11-16 Differential PrivacyAdversarial ExampleAdversarial attack 2018.08.10 2025.05.28 Literature Database
OptStream: Releasing Time Series Privately Authors: Ferdinando Fioretto, Pascal Van Hentenryck | Published: 2018-08-06 | Updated: 2018-10-30 Privacy Design PrinciplesDifferential PrivacyTime Series Analysis 2018.08.06 2025.05.28 Literature Database
Subsampled Rényi Differential Privacy and Analytical Moments Accountant Authors: Yu-Xiang Wang, Borja Balle, Shiva Kasiviswanathan | Published: 2018-07-31 | Updated: 2018-12-04 Characteristics of RDPPrivacy AssessmentDifferential Privacy 2018.07.31 2025.05.28 Literature Database
Security and Privacy Issues in Deep Learning Authors: Ho Bae, Jaehee Jang, Dahuin Jung, Hyemi Jang, Heonseok Ha, Hyungyu Lee, Sungroh Yoon | Published: 2018-07-31 | Updated: 2021-03-10 Differential PrivacyAdversarial Example DetectionAdversarial attack 2018.07.31 2025.05.28 Literature Database
Supervised and Semi-Supervised Deep Neural Networks for CSI-Based Authentication Authors: Qian Wang, Hang Li, Zhi Chen, Dou Zhao, Shuang Ye, Jiansheng Cai | Published: 2018-07-25 Model Design and AccuracyDifferential PrivacyFeature Extraction Method 2018.07.25 2025.05.28 Literature Database
Efficient Deep Learning on Multi-Source Private Data Authors: Nick Hynes, Raymond Cheng, Dawn Song | Published: 2018-07-17 Privacy-Preserving Machine LearningDifferential PrivacyDeep Learning 2018.07.17 2025.05.28 Literature Database