Secure Human Action Recognition by Encrypted Neural Network Inference Authors: Miran Kim, Xiaoqian Jiang, Kristin Lauter, Elkhan Ismayilzada, Shayan Shams | Published: 2021-04-19 | Updated: 2022-08-09 Data Protection MethodData Management SystemEncryption Technology 2021.04.19 2025.05.28 Literature Database
Perun: Secure Multi-Stakeholder Machine Learning Framework with GPU Support Authors: Wojciech Ozga, Do Le Quoc, Christof Fetzer | Published: 2021-03-31 Security labelData Protection MethodData Integrity Constraints 2021.03.31 2025.05.28 Literature Database
Security of Healthcare Data Using Blockchains: A Survey Authors: Mayank Pandey, Rachit Agarwal, Sandeep K. Shukla, Nishchal K. Verma | Published: 2021-03-23 Data Protection MethodBlockchain TechnologyTypes of Medical Data 2021.03.23 2025.05.28 Literature Database
ppAURORA: Privacy Preserving Area Under Receiver Operating Characteristic and Precision-Recall Curves Authors: Ali Burak Ünal, Nico Pfeifer, Mete Akgün | Published: 2021-02-17 | Updated: 2023-06-15 WatermarkingData Protection MethodModel Performance Evaluation 2021.02.17 2025.05.28 Literature Database
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey Authors: Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang | Published: 2021-02-16 | Updated: 2021-11-15 Data Protection MethodData CollectionUser Activity Analysis 2021.02.16 2025.05.28 Literature Database
Private Prediction Sets Authors: Anastasios N. Angelopoulos, Stephen Bates, Tijana Zrnic, Michael I. Jordan | Published: 2021-02-11 | Updated: 2024-03-03 WatermarkingData Protection MethodDifficulty Calibration 2021.02.11 2025.05.28 Literature Database
CaPC Learning: Confidential and Private Collaborative Learning Authors: Christopher A. Choquette-Choo, Natalie Dullerud, Adam Dziedzic, Yunxiang Zhang, Somesh Jha, Nicolas Papernot, Xiao Wang | Published: 2021-02-09 | Updated: 2021-03-19 Active LearningData Protection MethodEncryption Technology 2021.02.09 2025.05.28 Literature Database
$k$-Anonymity in Practice: How Generalisation and Suppression Affect Machine Learning Classifiers Authors: Djordje Slijepčević, Maximilian Henzl, Lukas Daniel Klausner, Tobias Dam, Peter Kieseberg, Matthias Zeppelzauer | Published: 2021-02-09 | Updated: 2022-06-22 Dataset evaluationData Protection MethodModel Performance Evaluation 2021.02.09 2025.05.28 Literature Database
Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack Authors: Ding Sheng Ong, Chee Seng Chan, Kam Woh Ng, Lixin Fan, Qiang Yang | Published: 2021-02-08 | Updated: 2021-03-01 WatermarkingData Protection MethodModel Performance Evaluation 2021.02.08 2025.05.28 Literature Database
Transparent Contribution Evaluation for Secure Federated Learning on Blockchain Authors: Shuaicheng Ma, Yang Cao, Li Xiong | Published: 2021-01-26 | Updated: 2021-04-24 Data Protection MethodIntegration of Blockchain and FLTrust Evaluation 2021.01.26 2025.05.28 Literature Database