Privacy-preserving Quantification of Non-IID Degree in Federated Learning Authors: Yuping Yan, Yizhi Wang, Yingchao Yu, Yaochu Jin | Published: 2024-06-14 Integration of FL and HEWatermarkingCryptography 2024.06.14 2025.05.27 Literature Database
Noise-Aware Differentially Private Regression via Meta-Learning Authors: Ossi Räisä, Stratis Markou, Matthew Ashman, Wessel P. Bruinsma, Marlon Tobaben, Antti Honkela, Richard E. Turner | Published: 2024-06-12 | Updated: 2025-05-08 WatermarkingData Privacy AssessmentPrivacy Protection Method 2024.06.12 2025.05.27 Literature Database
Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation Authors: Zhaoyi Lu, Wenchao Xu, Ming Tu, Xin Xie, Cunqing Hua, Nan Cheng | Published: 2024-06-11 | Updated: 2024-06-12 WatermarkingFingerprinting MethodSignal Perturbation Method 2024.06.11 2025.05.27 Literature Database
Robust Distribution Learning with Local and Global Adversarial Corruptions Authors: Sloan Nietert, Ziv Goldfeld, Soroosh Shafiee | Published: 2024-06-10 | Updated: 2024-06-24 WatermarkingLoss FunctionEvaluation Method 2024.06.10 2025.05.27 Literature Database
Injecting Undetectable Backdoors in Obfuscated Neural Networks and Language Models Authors: Alkis Kalavasis, Amin Karbasi, Argyris Oikonomou, Katerina Sotiraki, Grigoris Velegkas, Manolis Zampetakis | Published: 2024-06-09 | Updated: 2024-09-07 WatermarkingBackdoor Attack 2024.06.09 2025.05.27 Literature Database
GENIE: Watermarking Graph Neural Networks for Link Prediction Authors: Venkata Sai Pranav Bachina, Ankit Gangwal, Aaryan Ajay Sharma, Charu Sharma | Published: 2024-06-07 | Updated: 2025-01-12 WatermarkingPrompt InjectionWatermark Robustness 2024.06.07 2025.05.27 Literature Database
Contrastive explainable clustering with differential privacy Authors: Dung Nguyen, Ariel Vetzler, Sarit Kraus, Anil Vullikanti | Published: 2024-06-07 AlgorithmWatermarkingPrivacy Protection Method 2024.06.07 2025.05.27 Literature Database
FedAdOb: Privacy-Preserving Federated Deep Learning with Adaptive Obfuscation Authors: Hanlin Gu, Jiahuan Luo, Yan Kang, Yuan Yao, Gongxi Zhu, Bowen Li, Lixin Fan, Qiang Yang | Published: 2024-06-03 WatermarkingPrivacy Protection MethodModel Performance Evaluation 2024.06.03 2025.05.27 Literature Database
No Vandalism: Privacy-Preserving and Byzantine-Robust Federated Learning Authors: Zhibo Xing, Zijian Zhang, Zi'ang Zhang, Jiamou Liu, Liehuang Zhu, Giovanni Russello | Published: 2024-06-03 WatermarkingBackdoor AttackPoisoning 2024.06.03 2025.05.27 Literature Database
Seeing the Forest through the Trees: Data Leakage from Partial Transformer Gradients Authors: Weijun Li, Qiongkai Xu, Mark Dras | Published: 2024-06-03 | Updated: 2024-10-04 WatermarkingData Privacy AssessmentPrivacy Protection Method 2024.06.03 2025.05.27 Literature Database