Privacy Protection Method

Bounding Reconstruction Attack Success of Adversaries Without Data Priors

Authors: Alexander Ziller, Anneliese Riess, Kristian Schwethelm, Tamara T. Mueller, Daniel Rueckert, Georgios Kaissis | Published: 2024-02-20
Data Privacy Assessment
Privacy Protection Method
Watermark Evaluation

Privacy for Fairness: Information Obfuscation for Fair Representation Learning with Local Differential Privacy

Authors: Songjie Xie, Youlong Wu, Jiaxuan Li, Ming Ding, Khaled B. Letaief | Published: 2024-02-16
Privacy Protection Method
Fairness evaluation
Information Hiding Techniques

A chaotic maps-based privacy-preserving distributed deep learning for incomplete and Non-IID datasets

Authors: Irina Arévalo, Jose L. Salmeron | Published: 2024-02-15
Privacy Protection Method
Cryptography
Federated Learning

DPBalance: Efficient and Fair Privacy Budget Scheduling for Federated Learning as a Service

Authors: Yu Liu, Zibo Wang, Yifei Zhu, Chen Chen | Published: 2024-02-15
Privacy Protection
Privacy Protection Method
Efficiency Evaluation

Why Does Differential Privacy with Large Epsilon Defend Against Practical Membership Inference Attacks?

Authors: Andrew Lowy, Zhuohang Li, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang | Published: 2024-02-14
Privacy Protection
Privacy Protection Method
Membership Inference

Auditing Private Prediction

Authors: Karan Chadha, Matthew Jagielski, Nicolas Papernot, Christopher Choquette-Choo, Milad Nasr | Published: 2024-02-14
Data Privacy Assessment
Privacy Protection Method
Membership Inference

I can’t see it but I can Fine-tune it: On Encrypted Fine-tuning of Transformers using Fully Homomorphic Encryption

Authors: Prajwal Panzade, Daniel Takabi, Zhipeng Cai | Published: 2024-02-14
Watermarking
Privacy Protection
Privacy Protection Method

Differentially Private Training of Mixture of Experts Models

Authors: Pierre Tholoniat, Huseyin A. Inan, Janardhan Kulkarni, Robert Sim | Published: 2024-02-11
LLM Performance Evaluation
Privacy Protection Method
Model Performance Evaluation

Systematic Assessment of Tabular Data Synthesis Algorithms

Authors: Yuntao Du, Ninghui Li | Published: 2024-02-09 | Updated: 2024-04-13
Data Privacy Assessment
Data Generation
Privacy Protection Method

RQP-SGD: Differential Private Machine Learning through Noisy SGD and Randomized Quantization

Authors: Ce Feng, Parv Venkitasubramaniam | Published: 2024-02-09
Watermarking
Privacy Protection Method
Quantization and Privacy