Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection Authors: Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren | Published: 2018-08-10 | Updated: 2021-11-16 Differential PrivacyAdversarial ExampleAdversarial attack 2018.08.10 2025.05.28 Literature Database
OptStream: Releasing Time Series Privately Authors: Ferdinando Fioretto, Pascal Van Hentenryck | Published: 2018-08-06 | Updated: 2018-10-30 Privacy Design PrinciplesDifferential PrivacyTime Series Analysis 2018.08.06 2025.05.28 Literature Database
Subsampled Rényi Differential Privacy and Analytical Moments Accountant Authors: Yu-Xiang Wang, Borja Balle, Shiva Kasiviswanathan | Published: 2018-07-31 | Updated: 2018-12-04 Characteristics of RDPPrivacy AssessmentDifferential Privacy 2018.07.31 2025.05.28 Literature Database
Security and Privacy Issues in Deep Learning Authors: Ho Bae, Jaehee Jang, Dahuin Jung, Hyemi Jang, Heonseok Ha, Hyungyu Lee, Sungroh Yoon | Published: 2018-07-31 | Updated: 2021-03-10 Differential PrivacyAdversarial Example DetectionAdversarial attack 2018.07.31 2025.05.28 Literature Database
Supervised and Semi-Supervised Deep Neural Networks for CSI-Based Authentication Authors: Qian Wang, Hang Li, Zhi Chen, Dou Zhao, Shuang Ye, Jiansheng Cai | Published: 2018-07-25 Model Design and AccuracyDifferential PrivacyFeature Extraction Method 2018.07.25 2025.05.28 Literature Database
Efficient Deep Learning on Multi-Source Private Data Authors: Nick Hynes, Raymond Cheng, Dawn Song | Published: 2018-07-17 Privacy-Preserving Machine LearningDifferential PrivacyDeep Learning 2018.07.17 2025.05.28 Literature Database
Differentially-Private “Draw and Discard” Machine Learning Authors: Vasyl Pihur, Aleksandra Korolova, Frederick Liu, Subhash Sankuratripati, Moti Yung, Dachuan Huang, Ruogu Zeng | Published: 2018-07-11 | Updated: 2018-10-10 Privacy AssessmentModel EvaluationDifferential Privacy 2018.07.11 2025.05.28 Literature Database
An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors Authors: Joshua Allen, Bolin Ding, Janardhan Kulkarni, Harsha Nori, Olga Ohrimenko, Sergey Yekhanin | Published: 2018-07-02 | Updated: 2019-10-26 AlgorithmPrivacy Enhancing TechnologyDifferential Privacy 2018.07.02 2025.05.28 Literature Database
Privacy Preserving Analytics on Distributed Medical Data Authors: Marina Blanton, Ah Reum Kang, Subhadeep Karan, Jaroslaw Zola | Published: 2018-06-18 Data PreprocessingPrivacy Protection MethodDifferential Privacy 2018.06.18 2025.05.28 Literature Database
Differentially Private Confidence Intervals for Empirical Risk Minimization Authors: Yue Wang, Daniel Kifer, Jaewoo Lee | Published: 2018-04-11 Privacy Protection MethodDifferential PrivacyStatistical Methods 2018.04.11 2025.05.28 Literature Database