Privacy Protection Method

Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems

Authors: Sankha Baran Dutta, Hoda Naghibijouybari, Arjun Gupta, Nael Abu-Ghazaleh, Andres Marquez, Kevin Barker | Published: 2022-03-30
GPU Vulnerability
Privacy Protection Method
Physical attack

Quantum Differential Privacy: An Information Theory Perspective

Authors: Christoph Hirche, Cambyse Rouzé, Daniel Stilck França | Published: 2022-02-22 | Updated: 2023-04-06
Privacy Protection
Privacy Protection Method
Quantum Computing

Antipodes of Label Differential Privacy: PATE and ALIBI

Authors: Mani Malek, Ilya Mironov, Karthik Prasad, Igor Shilov, Florian Tramèr | Published: 2021-06-07 | Updated: 2021-10-29
Privacy Protection Method
Membership Inference
Label Uncertainty

Differentially Empirical Risk Minimization under the Fairness Lens

Authors: Cuong Tran, My H. Dinh, Ferdinando Fioretto | Published: 2021-06-04 | Updated: 2022-09-08
DP-SGD
Privacy Protection Method
Risk Management

On Privacy and Confidentiality of Communications in Organizational Graphs

Authors: Masoumeh Shafieinejad, Huseyin Inan, Marcello Hasegawa, Robert Sim | Published: 2021-05-27
Privacy Protection Method
Information-Theoretic Evaluation
Vulnerability Assessment Method

Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs

Authors: Chen Chen, Xuanli He, Lingjuan Lyu, Fangzhao Wu | Published: 2021-05-23 | Updated: 2021-12-26
Privacy Protection Method
Membership Inference
Natural Language Processing

Privacy Amplification Via Bernoulli Sampling

Authors: Jacob Imola, Kamalika Chaudhuri | Published: 2021-05-21 | Updated: 2021-10-18
Privacy Protection Method
Information-Theoretic Evaluation
Optimization Methods

Fed-EINI: An Efficient and Interpretable Inference Framework for Decision Tree Ensembles in Federated Learning

Authors: Xiaolin Chen, Shuai Zhou, Bei guan, Kai Yang, Hao Fan, Hu Wang, Yongji Wang | Published: 2021-05-20 | Updated: 2021-12-08
Privacy Protection Method
Computational Efficiency
Federated Learning

Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions

Authors: Runhua Xu, James Joshi | Published: 2020-11-12 | Updated: 2020-12-07
Watermarking
Privacy Protection Method
Efficiency Evaluation

Federated Transfer Learning: concept and applications

Authors: Sudipan Saha, Tahir Ahmad | Published: 2020-09-26 | Updated: 2021-03-06
Privacy Protection Method
Information-Theoretic Privacy
Machine Learning Method