Bounding Reconstruction Attack Success of Adversaries Without Data Priors Authors: Alexander Ziller, Anneliese Riess, Kristian Schwethelm, Tamara T. Mueller, Daniel Rueckert, Georgios Kaissis | Published: 2024-02-20 Data Privacy AssessmentPrivacy Protection MethodWatermark Evaluation 2024.02.20 2025.05.27 Literature Database
Privacy for Fairness: Information Obfuscation for Fair Representation Learning with Local Differential Privacy Authors: Songjie Xie, Youlong Wu, Jiaxuan Li, Ming Ding, Khaled B. Letaief | Published: 2024-02-16 Privacy Protection MethodFairness evaluationInformation Hiding Techniques 2024.02.16 2025.05.27 Literature Database
A chaotic maps-based privacy-preserving distributed deep learning for incomplete and Non-IID datasets Authors: Irina Arévalo, Jose L. Salmeron | Published: 2024-02-15 Privacy Protection MethodCryptographyFederated Learning 2024.02.15 2025.05.27 Literature Database
DPBalance: Efficient and Fair Privacy Budget Scheduling for Federated Learning as a Service Authors: Yu Liu, Zibo Wang, Yifei Zhu, Chen Chen | Published: 2024-02-15 Privacy ProtectionPrivacy Protection MethodEfficiency Evaluation 2024.02.15 2025.05.27 Literature Database
Why Does Differential Privacy with Large Epsilon Defend Against Practical Membership Inference Attacks? Authors: Andrew Lowy, Zhuohang Li, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang | Published: 2024-02-14 Privacy ProtectionPrivacy Protection MethodMembership Inference 2024.02.14 2025.05.27 Literature Database
Auditing Private Prediction Authors: Karan Chadha, Matthew Jagielski, Nicolas Papernot, Christopher Choquette-Choo, Milad Nasr | Published: 2024-02-14 Data Privacy AssessmentPrivacy Protection MethodMembership Inference 2024.02.14 2025.05.27 Literature Database
I can’t see it but I can Fine-tune it: On Encrypted Fine-tuning of Transformers using Fully Homomorphic Encryption Authors: Prajwal Panzade, Daniel Takabi, Zhipeng Cai | Published: 2024-02-14 WatermarkingPrivacy ProtectionPrivacy Protection Method 2024.02.14 2025.05.27 Literature Database
Differentially Private Training of Mixture of Experts Models Authors: Pierre Tholoniat, Huseyin A. Inan, Janardhan Kulkarni, Robert Sim | Published: 2024-02-11 LLM Performance EvaluationPrivacy Protection MethodModel Performance Evaluation 2024.02.11 2025.05.27 Literature Database
Systematic Assessment of Tabular Data Synthesis Algorithms Authors: Yuntao Du, Ninghui Li | Published: 2024-02-09 | Updated: 2024-04-13 Data Privacy AssessmentData GenerationPrivacy Protection Method 2024.02.09 2025.05.27 Literature Database
RQP-SGD: Differential Private Machine Learning through Noisy SGD and Randomized Quantization Authors: Ce Feng, Parv Venkitasubramaniam | Published: 2024-02-09 WatermarkingPrivacy Protection MethodQuantization and Privacy 2024.02.09 2025.05.27 Literature Database