Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset Distillation Authors: Noel Loo, Ramin Hasani, Mathias Lechner, Alexander Amini, Daniela Rus | Published: 2023-02-02 | Updated: 2023-11-09 Privacy Enhancing TechnologyModel Performance EvaluationReconstruction Durability 2023.02.02 2025.05.28 Literature Database
On the Efficacy of Differentially Private Few-shot Image Classification Authors: Marlon Tobaben, Aliaksandra Shysheya, John Bronskill, Andrew Paverd, Shruti Tople, Santiago Zanella-Beguelin, Richard E Turner, Antti Honkela | Published: 2023-02-02 | Updated: 2023-12-19 Few-Shot LearningPrivacy Enhancing TechnologyModel Performance Evaluation 2023.02.02 2025.05.28 Literature Database
Privacy Preserving Ultra-Short-term Wind Power Prediction Based on Secure Multi Party Computation Authors: Hang Fan, Xiaoyu Fan, Tianyi Hao, Wei Wei, Kun Chen, Guosai Wang, Xiaofeng Jia, Yidong Li, Wei Xu | Published: 2023-01-31 Privacy Enhancing TechnologyParticipant Selection MethodDecision Tree 2023.01.31 2025.05.28 Literature Database
Practical Differentially Private Hyperparameter Tuning with Subsampling Authors: Antti Koskela, Tejas Kulkarni | Published: 2023-01-27 | Updated: 2024-02-13 WatermarkingPrivacy Enhancing TechnologyOptimization Problem 2023.01.27 2025.05.28 Literature Database
Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning Authors: Tanveer Khan, Khoa Nguyen, Antonis Michalas | Published: 2023-01-20 DNN IP Protection MethodIntegration of FL and HEPrivacy Enhancing Technology 2023.01.20 2025.05.28 Literature Database
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data Authors: Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso | Published: 2023-01-18 | Updated: 2024-03-13 Privacy Enhancing TechnologyUser Authentication SystemSelf-Attention Mechanism 2023.01.18 2025.05.28 Literature Database
Command Line Interface Risk Modeling Authors: Dr Anthony L. Faulds | Published: 2023-01-17 Privacy Enhancing TechnologyModel Performance EvaluationFeature Importance Analysis 2023.01.17 2025.05.28 Literature Database
Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2023-01-09 | Updated: 2023-04-12 DNN IP Protection MethodPrivacy Enhancing TechnologyPoisoning 2023.01.09 2025.05.28 Literature Database
Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection Authors: Jordan Samhi, Maria Kober, Abdoul Kader Kabore, Steven Arzt, Tegawendé F. Bissyandé, Jacques Klein | Published: 2023-01-09 | Updated: 2023-01-11 Data Privacy AssessmentPrivacy Enhancing TechnologyProgram Analysis 2023.01.09 2025.05.28 Literature Database
Introducing Model Inversion Attacks on Automatic Speaker Recognition Authors: Karla Pizzi, Franziska Boenisch, Ugur Sahin, Konstantin Böttinger | Published: 2023-01-09 Privacy Enhancing TechnologyMembership InferenceSpeech Synthesis Technology 2023.01.09 2025.05.28 Literature Database