Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems Authors: Sankha Baran Dutta, Hoda Naghibijouybari, Arjun Gupta, Nael Abu-Ghazaleh, Andres Marquez, Kevin Barker | Published: 2022-03-30 GPU VulnerabilityPrivacy Protection MethodPhysical attack 2022.03.30 2025.05.28 Literature Database
Quantum Differential Privacy: An Information Theory Perspective Authors: Christoph Hirche, Cambyse Rouzé, Daniel Stilck França | Published: 2022-02-22 | Updated: 2023-04-06 Privacy ProtectionPrivacy Protection MethodQuantum Computing 2022.02.22 2025.05.28 Literature Database
Antipodes of Label Differential Privacy: PATE and ALIBI Authors: Mani Malek, Ilya Mironov, Karthik Prasad, Igor Shilov, Florian Tramèr | Published: 2021-06-07 | Updated: 2021-10-29 Privacy Protection MethodMembership InferenceLabel Uncertainty 2021.06.07 2025.05.28 Literature Database
Differentially Empirical Risk Minimization under the Fairness Lens Authors: Cuong Tran, My H. Dinh, Ferdinando Fioretto | Published: 2021-06-04 | Updated: 2022-09-08 DP-SGDPrivacy Protection MethodRisk Management 2021.06.04 2025.05.28 Literature Database
On Privacy and Confidentiality of Communications in Organizational Graphs Authors: Masoumeh Shafieinejad, Huseyin Inan, Marcello Hasegawa, Robert Sim | Published: 2021-05-27 Privacy Protection MethodInformation-Theoretic EvaluationVulnerability Assessment Method 2021.05.27 2025.05.28 Literature Database
Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs Authors: Chen Chen, Xuanli He, Lingjuan Lyu, Fangzhao Wu | Published: 2021-05-23 | Updated: 2021-12-26 Privacy Protection MethodMembership InferenceNatural Language Processing 2021.05.23 2025.05.28 Literature Database
Privacy Amplification Via Bernoulli Sampling Authors: Jacob Imola, Kamalika Chaudhuri | Published: 2021-05-21 | Updated: 2021-10-18 Privacy Protection MethodInformation-Theoretic EvaluationOptimization Methods 2021.05.21 2025.05.28 Literature Database
Fed-EINI: An Efficient and Interpretable Inference Framework for Decision Tree Ensembles in Federated Learning Authors: Xiaolin Chen, Shuai Zhou, Bei guan, Kai Yang, Hao Fan, Hu Wang, Yongji Wang | Published: 2021-05-20 | Updated: 2021-12-08 Privacy Protection MethodComputational EfficiencyFederated Learning 2021.05.20 2025.05.28 Literature Database
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions Authors: Runhua Xu, James Joshi | Published: 2020-11-12 | Updated: 2020-12-07 WatermarkingPrivacy Protection MethodEfficiency Evaluation 2020.11.12 2025.05.28 Literature Database
Federated Transfer Learning: concept and applications Authors: Sudipan Saha, Tahir Ahmad | Published: 2020-09-26 | Updated: 2021-03-06 Privacy Protection MethodInformation-Theoretic PrivacyMachine Learning Method 2020.09.26 2025.05.28 Literature Database