Impact of using a privacy model on smart buildings data for CO2 prediction Authors: Marlon P. da Silva, Henry C. Nunes, Charles V. Neu, Luana T. Thomas, Avelino F. Zorzo, Charles Morisset | Published: 2023-06-01 CO2 Identification ModelData Privacy AssessmentPrivacy Enhancing Technology 2023.06.01 2025.05.28 Literature Database
Differential Privacy with Random Projections and Sign Random Projections Authors: Ping Li, Xiaoyun Li | Published: 2023-05-22 | Updated: 2023-06-13 Data Privacy AssessmentPrivacy Enhancing TechnologyWatermark Evaluation 2023.05.22 2025.05.28 Literature Database
When approximate design for fast homomorphic computation provides differential privacy guarantees Authors: Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler | Published: 2023-04-06 WatermarkingPrivacy Enhancing TechnologyMachine Learning Method 2023.04.06 2025.05.28 Literature Database
Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification Authors: Jialin Liu, Ning Miao, Chongzhou Fang, Houman Homayoun, Han Wang | Published: 2023-04-04 Cyber AttackPrivacy Enhancing TechnologyAttack Method 2023.04.04 2025.05.28 Literature Database
On Mitigating the Utility-Loss in Differentially Private Learning: A new Perspective by a Geometrically Inspired Kernel Approach Authors: Mohit Kumar, Bernhard A. Moser, Lukas Fischer | Published: 2023-04-03 | Updated: 2024-02-07 Privacy Enhancing TechnologyMachine Learning MethodRegularization 2023.04.03 2025.05.28 Literature Database
Score Attack: A Lower Bound Technique for Optimal Differentially Private Learning Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2023-03-13 Privacy Enhancing TechnologyRisk Assessment MethodConvergence Property 2023.03.13 2025.05.28 Literature Database
From Noisy Fixed-Point Iterations to Private ADMM for Centralized and Federated Learning Authors: Edwige Cyffers, Aurélien Bellet, Debabrota Basu | Published: 2023-02-24 | Updated: 2023-07-12 Privacy Enhancing TechnologyConvergence AnalysisFixed Point Iteration Method 2023.02.24 2025.05.28 Literature Database
WW-FL: Secure and Private Large-Scale Federated Learning Authors: Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Christian Weinert, Hossein Yalame | Published: 2023-02-20 | Updated: 2025-10-14 Trigger DetectionPrivacy Enhancing TechnologyPoisoning 2023.02.20 2025.10.16 Literature Database
Certified private data release for sparse Lipschitz functions Authors: Konstantin Donhauser, Johan Lokna, Amartya Sanyal, March Boedihardjo, Robert Hönig, Fanny Yang | Published: 2023-02-19 | Updated: 2023-08-28 WatermarkingPrivacy Enhancing TechnologyModel Performance Evaluation 2023.02.19 2025.05.28 Literature Database
Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data Authors: Pratik Karmakar, Debabrota Basu | Published: 2023-02-16 | Updated: 2023-10-18 Privacy Enhancing TechnologyModel Performance EvaluationModel Extraction Attack 2023.02.16 2025.05.28 Literature Database