PCAL: A Privacy-preserving Intelligent Credit Risk Modeling Framework Based on Adversarial Learning Authors: Yuli Zheng, Zhenyu Wu, Ye Yuan, Tianlong Chen, Zhangyang Wang | Published: 2020-10-06 Data Protection MethodMachine LearningFinancial Intelligence 2020.10.06 2025.05.28 Literature Database
DarKnight: A Data Privacy Scheme for Training and Inference of Deep Neural Networks Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2020-06-01 | Updated: 2020-10-15 Data Protection MethodPrivacy AssessmentComputational Consistency 2020.06.01 2025.05.28 Literature Database
Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms Authors: Mohsen Minaei, S Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate | Published: 2020-05-28 Data Protection MethodPrivacy AssessmentAdversarial Attack Methods 2020.05.28 2025.05.28 Literature Database
TIPRDC: Task-Independent Privacy-Respecting Data Crowdsourcing Framework for Deep Learning with Anonymized Intermediate Representations Authors: Ang Li, Yixiao Duan, Huanrui Yang, Yiran Chen, Jianlei Yang | Published: 2020-05-23 | Updated: 2020-08-25 Data Protection MethodPrivacy AssessmentFeature Extraction Method 2020.05.23 2025.05.28 Literature Database
A Deep Learning Based Attack for The Chaos-based Image Encryption Authors: Chen He, Kan Ming, Yongwei Wang, Z. Jane Wang | Published: 2019-07-29 Data Protection MethodLoss FunctionCryptographic Protocol 2019.07.29 2025.05.28 Literature Database
Privacy-Enhancing Context Authentication from Location-Sensitive Data Authors: Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas | Published: 2019-04-18 | Updated: 2019-07-10 Data Protection MethodPrivacy ProtectionAuthentication Technology 2019.04.18 2025.05.28 Literature Database
CryptoNN: Training Neural Networks over Encrypted Data Authors: Runhua Xu, James B. D. Joshi, Chao Li | Published: 2019-04-15 | Updated: 2019-04-26 Data Protection MethodPrivacy Protection MethodCryptography 2019.04.15 2025.05.28 Literature Database
TG-PSM: Tunable Greedy Packet Sequence Morphing Based on Trace Clustering Authors: Farzam Fanitabasi | Published: 2019-04-01 Data Protection MethodData-Driven ClusteringPrivacy Protection Method 2019.04.01 2025.05.28 Literature Database
Private Machine Learning in TensorFlow using Secure Computation Authors: Morten Dahl, Jason Mancuso, Yann Dupis, Ben Decoste, Morgan Giraud, Ian Livingstone, Justin Patriquin, Gavin Uhma | Published: 2018-10-18 | Updated: 2018-10-23 Data Protection MethodPrivacy Risk ManagementComputational Consistency 2018.10.18 2025.05.28 Literature Database
IDMoB: IoT Data Marketplace on Blockchain Authors: Kazım Rıfat Özyılmaz, Mehmet Doğan, Arda Yurdakul | Published: 2018-09-30 IoT-Specific ThreatsData Protection MethodVoting Mechanism 2018.09.30 2025.05.28 Literature Database