Privacy Enhancing Technology

Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset Distillation

Authors: Noel Loo, Ramin Hasani, Mathias Lechner, Alexander Amini, Daniela Rus | Published: 2023-02-02 | Updated: 2023-11-09
Privacy Enhancing Technology
Model Performance Evaluation
Reconstruction Durability

On the Efficacy of Differentially Private Few-shot Image Classification

Authors: Marlon Tobaben, Aliaksandra Shysheya, John Bronskill, Andrew Paverd, Shruti Tople, Santiago Zanella-Beguelin, Richard E Turner, Antti Honkela | Published: 2023-02-02 | Updated: 2023-12-19
Few-Shot Learning
Privacy Enhancing Technology
Model Performance Evaluation

Privacy Preserving Ultra-Short-term Wind Power Prediction Based on Secure Multi Party Computation

Authors: Hang Fan, Xiaoyu Fan, Tianyi Hao, Wei Wei, Kun Chen, Guosai Wang, Xiaofeng Jia, Yidong Li, Wei Xu | Published: 2023-01-31
Privacy Enhancing Technology
Participant Selection Method
Decision Tree

Practical Differentially Private Hyperparameter Tuning with Subsampling

Authors: Antti Koskela, Tejas Kulkarni | Published: 2023-01-27 | Updated: 2024-02-13
Watermarking
Privacy Enhancing Technology
Optimization Problem

Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning

Authors: Tanveer Khan, Khoa Nguyen, Antonis Michalas | Published: 2023-01-20
DNN IP Protection Method
Integration of FL and HE
Privacy Enhancing Technology

Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data

Authors: Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso | Published: 2023-01-18 | Updated: 2024-03-13
Privacy Enhancing Technology
User Authentication System
Self-Attention Mechanism

Command Line Interface Risk Modeling

Authors: Dr Anthony L. Faulds | Published: 2023-01-17
Privacy Enhancing Technology
Model Performance Evaluation
Feature Importance Analysis

Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation

Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2023-01-09 | Updated: 2023-04-12
DNN IP Protection Method
Privacy Enhancing Technology
Poisoning

Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection

Authors: Jordan Samhi, Maria Kober, Abdoul Kader Kabore, Steven Arzt, Tegawendé F. Bissyandé, Jacques Klein | Published: 2023-01-09 | Updated: 2023-01-11
Data Privacy Assessment
Privacy Enhancing Technology
Program Analysis

Introducing Model Inversion Attacks on Automatic Speaker Recognition

Authors: Karla Pizzi, Franziska Boenisch, Ugur Sahin, Konstantin Böttinger | Published: 2023-01-09
Privacy Enhancing Technology
Membership Inference
Speech Synthesis Technology