Privacy Enhancing Technology

From Noisy Fixed-Point Iterations to Private ADMM for Centralized and Federated Learning

Authors: Edwige Cyffers, Aurélien Bellet, Debabrota Basu | Published: 2023-02-24 | Updated: 2023-07-12
Privacy Enhancing Technology
Convergence Analysis
Fixed Point Iteration Method

Certified private data release for sparse Lipschitz functions

Authors: Konstantin Donhauser, Johan Lokna, Amartya Sanyal, March Boedihardjo, Robert Hönig, Fanny Yang | Published: 2023-02-19 | Updated: 2023-08-28
Watermarking
Privacy Enhancing Technology
Model Performance Evaluation

Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data

Authors: Pratik Karmakar, Debabrota Basu | Published: 2023-02-16 | Updated: 2023-10-18
Privacy Enhancing Technology
Model Performance Evaluation
Model Extraction Attack

Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset Distillation

Authors: Noel Loo, Ramin Hasani, Mathias Lechner, Alexander Amini, Daniela Rus | Published: 2023-02-02 | Updated: 2023-11-09
Privacy Enhancing Technology
Model Performance Evaluation
Reconstruction Durability

On the Efficacy of Differentially Private Few-shot Image Classification

Authors: Marlon Tobaben, Aliaksandra Shysheya, John Bronskill, Andrew Paverd, Shruti Tople, Santiago Zanella-Beguelin, Richard E Turner, Antti Honkela | Published: 2023-02-02 | Updated: 2023-12-19
Few-Shot Learning
Privacy Enhancing Technology
Model Performance Evaluation

Privacy Preserving Ultra-Short-term Wind Power Prediction Based on Secure Multi Party Computation

Authors: Hang Fan, Xiaoyu Fan, Tianyi Hao, Wei Wei, Kun Chen, Guosai Wang, Xiaofeng Jia, Yidong Li, Wei Xu | Published: 2023-01-31
Privacy Enhancing Technology
Participant Selection Method
Decision Tree

Practical Differentially Private Hyperparameter Tuning with Subsampling

Authors: Antti Koskela, Tejas Kulkarni | Published: 2023-01-27 | Updated: 2024-02-13
Watermarking
Privacy Enhancing Technology
Optimization Problem

Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning

Authors: Tanveer Khan, Khoa Nguyen, Antonis Michalas | Published: 2023-01-20
DNN IP Protection Method
Integration of FL and HE
Privacy Enhancing Technology

Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data

Authors: Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso | Published: 2023-01-18 | Updated: 2024-03-13
Privacy Enhancing Technology
User Authentication System
Self-Attention Mechanism

Command Line Interface Risk Modeling

Authors: Dr Anthony L. Faulds | Published: 2023-01-17
Privacy Enhancing Technology
Model Performance Evaluation
Feature Importance Analysis