From Noisy Fixed-Point Iterations to Private ADMM for Centralized and Federated Learning Authors: Edwige Cyffers, Aurélien Bellet, Debabrota Basu | Published: 2023-02-24 | Updated: 2023-07-12 Privacy Enhancing TechnologyConvergence AnalysisFixed Point Iteration Method 2023.02.24 2025.05.28 Literature Database
Certified private data release for sparse Lipschitz functions Authors: Konstantin Donhauser, Johan Lokna, Amartya Sanyal, March Boedihardjo, Robert Hönig, Fanny Yang | Published: 2023-02-19 | Updated: 2023-08-28 WatermarkingPrivacy Enhancing TechnologyModel Performance Evaluation 2023.02.19 2025.05.28 Literature Database
Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data Authors: Pratik Karmakar, Debabrota Basu | Published: 2023-02-16 | Updated: 2023-10-18 Privacy Enhancing TechnologyModel Performance EvaluationModel Extraction Attack 2023.02.16 2025.05.28 Literature Database
Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset Distillation Authors: Noel Loo, Ramin Hasani, Mathias Lechner, Alexander Amini, Daniela Rus | Published: 2023-02-02 | Updated: 2023-11-09 Privacy Enhancing TechnologyModel Performance EvaluationReconstruction Durability 2023.02.02 2025.05.28 Literature Database
On the Efficacy of Differentially Private Few-shot Image Classification Authors: Marlon Tobaben, Aliaksandra Shysheya, John Bronskill, Andrew Paverd, Shruti Tople, Santiago Zanella-Beguelin, Richard E Turner, Antti Honkela | Published: 2023-02-02 | Updated: 2023-12-19 Few-Shot LearningPrivacy Enhancing TechnologyModel Performance Evaluation 2023.02.02 2025.05.28 Literature Database
Privacy Preserving Ultra-Short-term Wind Power Prediction Based on Secure Multi Party Computation Authors: Hang Fan, Xiaoyu Fan, Tianyi Hao, Wei Wei, Kun Chen, Guosai Wang, Xiaofeng Jia, Yidong Li, Wei Xu | Published: 2023-01-31 Privacy Enhancing TechnologyParticipant Selection MethodDecision Tree 2023.01.31 2025.05.28 Literature Database
Practical Differentially Private Hyperparameter Tuning with Subsampling Authors: Antti Koskela, Tejas Kulkarni | Published: 2023-01-27 | Updated: 2024-02-13 WatermarkingPrivacy Enhancing TechnologyOptimization Problem 2023.01.27 2025.05.28 Literature Database
Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning Authors: Tanveer Khan, Khoa Nguyen, Antonis Michalas | Published: 2023-01-20 DNN IP Protection MethodIntegration of FL and HEPrivacy Enhancing Technology 2023.01.20 2025.05.28 Literature Database
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data Authors: Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso | Published: 2023-01-18 | Updated: 2024-03-13 Privacy Enhancing TechnologyUser Authentication SystemSelf-Attention Mechanism 2023.01.18 2025.05.28 Literature Database
Command Line Interface Risk Modeling Authors: Dr Anthony L. Faulds | Published: 2023-01-17 Privacy Enhancing TechnologyModel Performance EvaluationFeature Importance Analysis 2023.01.17 2025.05.28 Literature Database