Data Protection Method

TIPRDC: Task-Independent Privacy-Respecting Data Crowdsourcing Framework for Deep Learning with Anonymized Intermediate Representations

Authors: Ang Li, Yixiao Duan, Huanrui Yang, Yiran Chen, Jianlei Yang | Published: 2020-05-23 | Updated: 2020-08-25
Data Protection Method
Privacy Assessment
Feature Extraction Method

A Deep Learning Based Attack for The Chaos-based Image Encryption

Authors: Chen He, Kan Ming, Yongwei Wang, Z. Jane Wang | Published: 2019-07-29
Data Protection Method
Loss Function
Cryptographic Protocol

Privacy-Enhancing Context Authentication from Location-Sensitive Data

Authors: Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas | Published: 2019-04-18 | Updated: 2019-07-10
Data Protection Method
Privacy Protection
Authentication Technology

CryptoNN: Training Neural Networks over Encrypted Data

Authors: Runhua Xu, James B. D. Joshi, Chao Li | Published: 2019-04-15 | Updated: 2019-04-26
Data Protection Method
Privacy Protection Method
Cryptography

TG-PSM: Tunable Greedy Packet Sequence Morphing Based on Trace Clustering

Authors: Farzam Fanitabasi | Published: 2019-04-01
Data Protection Method
Data-Driven Clustering
Privacy Protection Method

Private Machine Learning in TensorFlow using Secure Computation

Authors: Morten Dahl, Jason Mancuso, Yann Dupis, Ben Decoste, Morgan Giraud, Ian Livingstone, Justin Patriquin, Gavin Uhma | Published: 2018-10-18 | Updated: 2018-10-23
Data Protection Method
Privacy Risk Management
Computational Consistency

IDMoB: IoT Data Marketplace on Blockchain

Authors: Kazım Rıfat Özyılmaz, Mehmet Doğan, Arda Yurdakul | Published: 2018-09-30
IoT-Specific Threats
Data Protection Method
Voting Mechanism

SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation

Authors: Prabuddha Chakraborty, Jonathan Cruz, Swarup Bhunia | Published: 2018-09-27
Data Protection Method
Robustness Improvement Method
Efficiency Evaluation

Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT

Authors: Meng Shen, Baoli Ma, Liehuang Zhu, Xiaojiang Du, Ke Xu | Published: 2018-09-21
Data Protection Method
Privacy Risk Management
Encryption Method