Decentralized Federated Learning: A Survey on Security and Privacy Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif, Boyu Wang, Qiang Yang | Published: 2024-01-25 Attack Methods against DFLBackdoor AttackPrivacy Protection Method 2024.01.25 2025.05.27 Literature Database
Wasserstein Differential Privacy Authors: Chengyi Yang, Jiayin Qi, Aimin Zhou | Published: 2024-01-23 WatermarkingPrivacy Protection MethodWatermark Evaluation 2024.01.23 2025.05.27 Literature Database
Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey and the Open Libraries Behind Them Authors: Chao Liu, Boxi Chen, Wei Shao, Chris Zhang, Kelvin Wong, Yi Zhang | Published: 2024-01-22 | Updated: 2024-01-27 Backdoor AttackPrivacy Protection MethodMembership Inference 2024.01.22 2025.05.27 Literature Database
Differentially Private Sliced Inverse Regression: Minimax Optimality and Algorithm Authors: Xintao Xia, Linjun Zhang, Zhanrui Cai | Published: 2024-01-16 AlgorithmAlgorithm DesignPrivacy Protection Method 2024.01.16 2025.05.27 Literature Database
Quantum Privacy Aggregation of Teacher Ensembles (QPATE) for Privacy-preserving Quantum Machine Learning Authors: William Watkins, Heehwan Wang, Sangyoon Bae, Huan-Hsin Tseng, Jiook Cha, Samuel Yen-Chi Chen, Shinjae Yoo | Published: 2024-01-15 Privacy Protection MethodQuantum FrameworkQuantum Machine Learning 2024.01.15 2025.05.27 Literature Database
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models Authors: Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li | Published: 2024-01-14 Privacy Protection MethodPoisoningWatermark Evaluation 2024.01.14 2025.05.27 Literature Database
Privacy-Preserving in Blockchain-based Federated Learning Systems Authors: Sameera K. M., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Rafidha Rehiman K. A., Vinod P, Mauro Conti | Published: 2024-01-07 Privacy Protection MethodBlockchain TechnologyFederated Learning 2024.01.07 2025.05.27 Literature Database
Adaptive Differential Privacy in Federated Learning: A Priority-Based Approach Authors: Mahtab Talaei, Iman Izadi | Published: 2024-01-04 Privacy ProtectionPrivacy Protection MethodFederated Learning 2024.01.04 2025.05.27 Literature Database
Locally Differentially Private Embedding Models in Distributed Fraud Prevention Systems Authors: Iker Perez, Jason Wong, Piotr Skalski, Stuart Burrell, Richard Mortier, Derek McAuley, David Sutton | Published: 2024-01-03 Privacy ProtectionPrivacy Protection MethodFraudulent Transaction 2024.01.03 2025.05.27 Literature Database
PPBFL: A Privacy Protected Blockchain-based Federated Learning Model Authors: Yang Li, Chunhe Xia, Wanshuang Lin, Tianbo Wang | Published: 2024-01-02 | Updated: 2024-01-08 Privacy Protection MethodModel CommunicationFederated Learning 2024.01.02 2025.05.27 Literature Database