Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy Authors: Chandra Thapa, Seyit Camtepe | Published: 2020-08-24 Smart HealthcarePrivacy Protection MethodEncryption Technology 2020.08.24 2025.05.28 Literature Database
Towards Plausible Differentially Private ADMM Based Distributed Machine Learning Authors: Jiahao Ding, Jingyi Wang, Guannan Liang, Jinbo Bi, Miao Pan | Published: 2020-08-11 Privacy Protection MethodOptimization ProblemComputational Efficiency 2020.08.11 2025.05.28 Literature Database
PrivEdge: From Local to Distributed Private Training and Prediction Authors: Ali Shahin Shamsabadi, Adria Gascon, Hamed Haddadi, Andrea Cavallaro | Published: 2020-04-12 Privacy Protection MethodPrivacy IssuesImage Processing 2020.04.12 2025.05.28 Literature Database
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks Authors: Kalikinkar Mandal, Guang Gong | Published: 2020-04-05 Privacy Protection MethodLinear RegressionFederated Learning 2020.04.05 2025.05.28 Literature Database
Information Leakage in Embedding Models Authors: Congzheng Song, Ananth Raghunathan | Published: 2020-03-31 | Updated: 2020-08-19 Privacy Protection MethodPrivacy IssuesMembership Inference 2020.03.31 2025.05.28 Literature Database
Differentially Private Naive Bayes Classifier using Smooth Sensitivity Authors: Farzad Zafarani, Chris Clifton | Published: 2020-03-31 | Updated: 2021-07-19 Privacy Protection MethodMachine Learning ApplicationComputational Efficiency 2020.03.31 2025.05.28 Literature Database
Systematic Evaluation of Privacy Risks of Machine Learning Models Authors: Liwei Song, Prateek Mittal | Published: 2020-03-24 | Updated: 2020-12-09 Privacy Protection MethodMembership InferenceDefense Method 2020.03.24 2025.05.28 Literature Database
DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks Authors: Claude Rosin Ngueveu, Antoine Boutet, Carole Frindel, Sébastien Gambs, Théo Jourdan, Claude Rosin | Published: 2020-03-23 | Updated: 2020-10-08 Training MethodPrivacy Protection MethodUser Activity Analysis 2020.03.23 2025.05.28 Literature Database
Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication Authors: Abhishek Jana, Bipin Paudel, Md Kamruzzaman Sarker, Monireh Ebrahimi, Pascal Hitzler, George T Amariucai | Published: 2020-03-18 | Updated: 2023-12-19 Error Correction CodeTraining MethodPrivacy Protection Method 2020.03.18 2025.05.28 Literature Database
Deep Quaternion Features for Privacy Protection Authors: Hao Zhang, Yiting Chen, Liyao Xiang, Haotian Ma, Jie Shi, Quanshi Zhang | Published: 2020-03-18 | Updated: 2020-06-21 DNN IP Protection MethodPrivacy Protection MethodQuantum Cryptography Technology 2020.03.18 2025.05.28 Literature Database