Differentially Private Knowledge Distillation via Synthetic Text Generation Authors: James Flemings, Murali Annavaram | Published: 2024-03-01 | Updated: 2024-06-05 Data GenerationPrivacy Protection MethodModel Performance Evaluation 2024.03.01 2025.05.27 Literature Database
Shifted Interpolation for Differential Privacy Authors: Jinho Bok, Weijie Su, Jason M. Altschuler | Published: 2024-03-01 | Updated: 2024-06-12 Privacy Protection MethodConvergence GuaranteeLoss Function 2024.03.01 2025.05.27 Literature Database
Closed-Form Bounds for DP-SGD against Record-level Inference Authors: Giovanni Cherubin, Boris Köpf, Andrew Paverd, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin | Published: 2024-02-22 Privacy Protection MethodBayesian SecurityMembership Inference 2024.02.22 2025.05.27 Literature Database
Revisiting Differentially Private Hyper-parameter Tuning Authors: Zihang Xiang, Tianhao Wang, Chenglong Wang, Di Wang | Published: 2024-02-20 | Updated: 2024-06-04 Hyperparameter TuningPrivacy Protection MethodWatermark Evaluation 2024.02.20 2025.05.27 Literature Database
Bounding Reconstruction Attack Success of Adversaries Without Data Priors Authors: Alexander Ziller, Anneliese Riess, Kristian Schwethelm, Tamara T. Mueller, Daniel Rueckert, Georgios Kaissis | Published: 2024-02-20 Data Privacy AssessmentPrivacy Protection MethodWatermark Evaluation 2024.02.20 2025.05.27 Literature Database
Privacy for Fairness: Information Obfuscation for Fair Representation Learning with Local Differential Privacy Authors: Songjie Xie, Youlong Wu, Jiaxuan Li, Ming Ding, Khaled B. Letaief | Published: 2024-02-16 Privacy Protection MethodFairness evaluationInformation Hiding Techniques 2024.02.16 2025.05.27 Literature Database
A chaotic maps-based privacy-preserving distributed deep learning for incomplete and Non-IID datasets Authors: Irina Arévalo, Jose L. Salmeron | Published: 2024-02-15 Privacy Protection MethodCryptographyFederated Learning 2024.02.15 2025.05.27 Literature Database
DPBalance: Efficient and Fair Privacy Budget Scheduling for Federated Learning as a Service Authors: Yu Liu, Zibo Wang, Yifei Zhu, Chen Chen | Published: 2024-02-15 Privacy ProtectionPrivacy Protection MethodEfficiency Evaluation 2024.02.15 2025.05.27 Literature Database
Why Does Differential Privacy with Large Epsilon Defend Against Practical Membership Inference Attacks? Authors: Andrew Lowy, Zhuohang Li, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang | Published: 2024-02-14 Privacy ProtectionPrivacy Protection MethodMembership Inference 2024.02.14 2025.05.27 Literature Database
Auditing Private Prediction Authors: Karan Chadha, Matthew Jagielski, Nicolas Papernot, Christopher Choquette-Choo, Milad Nasr | Published: 2024-02-14 Data Privacy AssessmentPrivacy Protection MethodMembership Inference 2024.02.14 2025.05.27 Literature Database