A Blockchain Solution for Collaborative Machine Learning over IoT Authors: Carlos Beis-Penedo, Francisco Troncoso-Pastoriza, Rebeca P. Díaz-Redondo, Ana Fernández-Vilas, Manuel Fernández-Veiga, Martín González Soto | Published: 2023-11-23 Security AnalysisPrivacy ProtectionMachine Learning Method 2023.11.23 2025.05.28 Literature Database
DPSUR: Accelerating Differentially Private Stochastic Gradient Descent Using Selective Update and Release Authors: Jie Fu, Qingqing Ye, Haibo Hu, Zhili Chen, Lulu Wang, Kuncan Wang, Xun Ran | Published: 2023-11-23 | Updated: 2023-11-29 Privacy ProtectionOptimization MethodsEvaluation Method 2023.11.23 2025.05.28 Literature Database
PrivateLoRA For Efficient Privacy Preserving LLM Authors: Yiming Wang, Yu Lin, Xiaodong Zeng, Guannan Zhang | Published: 2023-11-23 Training ProtocolPrivacy ProtectionMembership Inference 2023.11.23 2025.05.28 Literature Database
Enhancing Intrusion Detection In Internet Of Vehicles Through Federated Learning Authors: Abhishek Sebastian, Pragna R, Sudhakaran G, Renjith P N, Leela Karthikeyan H | Published: 2023-11-23 Data PreprocessingPrivacy ProtectionIntrusion Detection System 2023.11.23 2025.05.28 Literature Database
From Principle to Practice: Vertical Data Minimization for Machine Learning Authors: Robin Staab, Nikola Jovanović, Mislav Balunović, Martin Vechev | Published: 2023-11-17 | Updated: 2023-11-22 Data Management SystemPrivacy ProtectionEvaluation Method 2023.11.17 2025.05.28 Literature Database
Are Normalizing Flows the Key to Unlocking the Exponential Mechanism? Authors: Robert A. Bridges, Vandy J. Tombs, Christopher B. Stanley | Published: 2023-11-15 | Updated: 2024-06-11 Privacy ProtectionConvergence PropertyMachine Learning Method 2023.11.15 2025.05.28 Literature Database
Input Reconstruction Attack against Vertical Federated Large Language Models Authors: Fei Zheng | Published: 2023-11-07 | Updated: 2023-11-24 Characteristics of VFLPrivacy ProtectionDefense Method 2023.11.07 2025.05.28 Literature Database
DPZero: Private Fine-Tuning of Language Models without Backpropagation Authors: Liang Zhang, Bingcong Li, Kiran Koshy Thekumparampil, Sewoong Oh, Niao He | Published: 2023-10-14 | Updated: 2024-06-06 Privacy ProtectionPrivacy Protection MethodOptimization Methods 2023.10.14 2025.05.28 Literature Database
Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption Authors: Hassan Jameel Asghar, Zhigang Lu, Zhongrui Zhao, Dali Kaafar | Published: 2023-10-04 | Updated: 2024-10-07 WatermarkingPrivacy ProtectionLoss Function 2023.10.04 2025.05.28 Literature Database
zkFL: Zero-Knowledge Proof-based Gradient Aggregation for Federated Learning Authors: Zhipeng Wang, Nanqing Dong, Jiahao Sun, William Knottenbelt, Yike Guo | Published: 2023-10-04 | Updated: 2024-05-10 WatermarkingPrivacy ProtectionFederated Learning 2023.10.04 2025.05.28 Literature Database