Privacy Protection Method

A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses

Authors: Caelin G. Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira | Published: 2023-10-18
Privacy Protection Method
Privacy Technique
Defense Method

Privacy-Preserving Graph Embedding based on Local Differential Privacy

Authors: Zening Li, Rong-Hua Li, Meihao Liao, Fusheng Jin, Guoren Wang | Published: 2023-10-17 | Updated: 2024-08-04
Graph Embedding
Privacy Protection Method
Privacy Technique

Private Synthetic Data Meets Ensemble Learning

Authors: Haoyuan Sun, Navid Azizan, Akash Srivastava, Hao Wang | Published: 2023-10-15
Data Generation
Privacy Protection Method
evaluation metrics

DPZero: Private Fine-Tuning of Language Models without Backpropagation

Authors: Liang Zhang, Bingcong Li, Kiran Koshy Thekumparampil, Sewoong Oh, Niao He | Published: 2023-10-14 | Updated: 2024-06-06
Privacy Protection
Privacy Protection Method
Optimization Methods

Privacy-Preserving Financial Anomaly Detection via Federated Learning & Multi-Party Computation

Authors: Sunpreet Arora, Andrew Beams, Panagiotis Chatzigiannis, Sebastian Meiser, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Harshal Shah, Yizhen Wang, Yuhang Wu, Hao Yang, Mahdi Zamani | Published: 2023-10-06
Privacy Protection Method
Multi-Party Computation
Federated Learning

A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning

Authors: Padmaksha Roy, Jaganmohan Chandrasekaran, Erin Lanus, Laura Freeman, Jeremy Werner | Published: 2023-10-06 | Updated: 2023-12-04
Data Protection Method
Privacy Protection Method
Poisoning

SABLE: Secure And Byzantine robust LEarning

Authors: Antoine Choffrut, Rachid Guerraoui, Rafael Pinot, Renaud Sirdey, John Stephan, Martin Zuber | Published: 2023-09-11 | Updated: 2023-12-14
Watermarking
Byzantine Resilience
Privacy Protection Method

Threshold KNN-Shapley: A Linear-Time and Privacy-Friendly Approach to Data Valuation

Authors: Jiachen T. Wang, Yuqing Zhu, Yu-Xiang Wang, Ruoxi Jia, Prateek Mittal | Published: 2023-08-30 | Updated: 2023-11-26
Data Generation
Privacy Protection Method
Computational Efficiency

Generating tabular datasets under differential privacy

Authors: Gianluca Truda | Published: 2023-08-28
Data Generation
Privacy Protection
Privacy Protection Method

ULDP-FL: Federated Learning with Across Silo User-Level Differential Privacy

Authors: Fumiyuki Kato, Li Xiong, Shun Takagi, Yang Cao, Masatoshi Yoshikawa | Published: 2023-08-23 | Updated: 2024-06-16
Privacy Protection
Privacy Protection Method
Federated Learning