A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses Authors: Caelin G. Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira | Published: 2023-10-18 Privacy Protection MethodPrivacy TechniqueDefense Method 2023.10.18 2025.05.28 Literature Database
Privacy-Preserving Graph Embedding based on Local Differential Privacy Authors: Zening Li, Rong-Hua Li, Meihao Liao, Fusheng Jin, Guoren Wang | Published: 2023-10-17 | Updated: 2024-08-04 Graph EmbeddingPrivacy Protection MethodPrivacy Technique 2023.10.17 2025.05.28 Literature Database
Private Synthetic Data Meets Ensemble Learning Authors: Haoyuan Sun, Navid Azizan, Akash Srivastava, Hao Wang | Published: 2023-10-15 Data GenerationPrivacy Protection Methodevaluation metrics 2023.10.15 2025.05.28 Literature Database
DPZero: Private Fine-Tuning of Language Models without Backpropagation Authors: Liang Zhang, Bingcong Li, Kiran Koshy Thekumparampil, Sewoong Oh, Niao He | Published: 2023-10-14 | Updated: 2024-06-06 Privacy ProtectionPrivacy Protection MethodOptimization Methods 2023.10.14 2025.05.28 Literature Database
Privacy-Preserving Financial Anomaly Detection via Federated Learning & Multi-Party Computation Authors: Sunpreet Arora, Andrew Beams, Panagiotis Chatzigiannis, Sebastian Meiser, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Harshal Shah, Yizhen Wang, Yuhang Wu, Hao Yang, Mahdi Zamani | Published: 2023-10-06 Privacy Protection MethodMulti-Party ComputationFederated Learning 2023.10.06 2025.05.28 Literature Database
A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning Authors: Padmaksha Roy, Jaganmohan Chandrasekaran, Erin Lanus, Laura Freeman, Jeremy Werner | Published: 2023-10-06 | Updated: 2023-12-04 Data Protection MethodPrivacy Protection MethodPoisoning 2023.10.06 2025.05.28 Literature Database
SABLE: Secure And Byzantine robust LEarning Authors: Antoine Choffrut, Rachid Guerraoui, Rafael Pinot, Renaud Sirdey, John Stephan, Martin Zuber | Published: 2023-09-11 | Updated: 2023-12-14 WatermarkingByzantine ResiliencePrivacy Protection Method 2023.09.11 2025.05.28 Literature Database
Threshold KNN-Shapley: A Linear-Time and Privacy-Friendly Approach to Data Valuation Authors: Jiachen T. Wang, Yuqing Zhu, Yu-Xiang Wang, Ruoxi Jia, Prateek Mittal | Published: 2023-08-30 | Updated: 2023-11-26 Data GenerationPrivacy Protection MethodComputational Efficiency 2023.08.30 2025.05.28 Literature Database
Generating tabular datasets under differential privacy Authors: Gianluca Truda | Published: 2023-08-28 Data GenerationPrivacy ProtectionPrivacy Protection Method 2023.08.28 2025.05.28 Literature Database
ULDP-FL: Federated Learning with Across Silo User-Level Differential Privacy Authors: Fumiyuki Kato, Li Xiong, Shun Takagi, Yang Cao, Masatoshi Yoshikawa | Published: 2023-08-23 | Updated: 2024-06-16 Privacy ProtectionPrivacy Protection MethodFederated Learning 2023.08.23 2025.05.28 Literature Database