SoK: Privacy Preserving Machine Learning using Functional Encryption: Opportunities and Challenges Authors: Prajwal Panzade, Daniel Takabi | Published: 2022-04-11 | Updated: 2022-09-02 WatermarkingPrivacy ProtectionPrivacy Protection in Machine Learning 2022.04.11 2025.05.28 Literature Database
Stability and Generalization of Differentially Private Minimax Problems Authors: Yilin Kang, Yong Liu, Jian Li, Weiping Wang | Published: 2022-04-11 | Updated: 2022-04-22 Privacy ProtectionGeneralization PerformanceLoss Function 2022.04.11 2025.05.28 Literature Database
HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection Authors: Mohanad Sarhan, Wai Weng Lo, Siamak Layeghy, Marius Portmann | Published: 2022-04-08 Smart ContractPrivacy ProtectionDistributed Learning 2022.04.08 2025.05.28 Literature Database
Distributed data analytics Authors: Richard Mortier, Hamed Haddadi, Sandra Servia, Liang Wang | Published: 2022-03-26 Backdoor AttackPrivacy ProtectionCommunication Model 2022.03.26 2025.05.28 Literature Database
MERLIN — Malware Evasion with Reinforcement LearnINg Authors: Tony Quertier, Benjamin Marais, Stéphane Morucci, Bertrand Fournel | Published: 2022-03-24 | Updated: 2022-03-30 Privacy ProtectionReinforcement Learning AlgorithmDefense Method 2022.03.24 2025.05.28 Literature Database
SoK: Differential Privacy on Graph-Structured Data Authors: Tamara T. Mueller, Dmitrii Usynin, Johannes C. Paetzold, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-17 Graph PrivacyPrivacy ProtectionPrivacy Analysis 2022.03.17 2025.05.28 Literature Database
Quantum Differential Privacy: An Information Theory Perspective Authors: Christoph Hirche, Cambyse Rouzé, Daniel Stilck França | Published: 2022-02-22 | Updated: 2023-04-06 Privacy ProtectionPrivacy Protection MethodQuantum Computing 2022.02.22 2025.05.28 Literature Database
EIFFeL: Ensuring Integrity for Federated Learning Authors: Amrita Roy Chowdhury, Chuan Guo, Somesh Jha, Laurens van der Maaten | Published: 2021-12-23 | Updated: 2022-09-12 Data Integrity ConstraintsPrivacy ProtectionMalicious Client 2021.12.23 2025.05.28 Literature Database
Mitigating Leakage from Data Dependent Communications in Decentralized Computing using Differential Privacy Authors: Riad Ladjel, Nicolas Anciaux, Aurélien Bellet, Guillaume Scerri | Published: 2021-12-23 Data DependencyPrivacy ProtectionCommunication Efficiency 2021.12.23 2025.05.28 Literature Database
Flatee: Federated Learning Across Trusted Execution Environments Authors: Arup Mondal, Yash More, Ruthu Hulikal Rooparaghunath, Debayan Gupta | Published: 2021-11-12 Privacy Risk ManagementPrivacy ProtectionFederated Learning 2021.11.12 2025.05.28 Literature Database