Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions Authors: Subrato Bharati, Prajoy Podder | Published: 2022-10-24 IoT Security RisksPrivacy ProtectionDeep Learning Technology 2022.10.24 2025.05.28 Literature Database
Android Private Compute Core Architecture Authors: Eugenio Marchiori, Sarah de Haas, Sergey Volnov, Ronnie Falcon, Roxanne Pinto, Marco Zamarato | Published: 2022-09-21 | Updated: 2022-09-22 Privacy ProtectionPrivacy TechniqueDynamic Access Control 2022.09.21 2025.05.28 Literature Database
dpart: Differentially Private Autoregressive Tabular, a General Framework for Synthetic Data Generation Authors: Sofiane Mahiou, Kai Xu, Georgi Ganev | Published: 2022-07-12 Algorithm DesignPrivacy ProtectionPrivacy Enhancing Technology 2022.07.12 2025.05.28 Literature Database
Federated and Transfer Learning: A Survey on Adversaries and Defense Mechanisms Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif | Published: 2022-07-05 Privacy ProtectionPoisoningDefense Method 2022.07.05 2025.05.28 Literature Database
Federated Split GANs Authors: Pranvera Kortoçi, Yilei Liang, Pengyuan Zhou, Lik-Hang Lee, Abbas Mehrabi, Pan Hui, Sasu Tarkoma, Jon Crowcroft | Published: 2022-07-04 Privacy ProtectionEfficiency of Distributed LearningChallenges of Generative Models 2022.07.04 2025.05.28 Literature Database
Scalable privacy-preserving cancer type prediction with homomorphic encryption Authors: Esha Sarkar, Eduardo Chielle, Gamze Gursoy, Leo Chen, Mark Gerstein, Michail Maniatakos | Published: 2022-04-12 Privacy ProtectionMatrix Multiplication Methodsevaluation metrics 2022.04.12 2025.05.28 Literature Database
SoK: Privacy Preserving Machine Learning using Functional Encryption: Opportunities and Challenges Authors: Prajwal Panzade, Daniel Takabi | Published: 2022-04-11 | Updated: 2022-09-02 WatermarkingPrivacy ProtectionPrivacy Protection in Machine Learning 2022.04.11 2025.05.28 Literature Database
Stability and Generalization of Differentially Private Minimax Problems Authors: Yilin Kang, Yong Liu, Jian Li, Weiping Wang | Published: 2022-04-11 | Updated: 2022-04-22 Privacy ProtectionGeneralization PerformanceLoss Function 2022.04.11 2025.05.28 Literature Database
HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection Authors: Mohanad Sarhan, Wai Weng Lo, Siamak Layeghy, Marius Portmann | Published: 2022-04-08 Smart ContractPrivacy ProtectionDistributed Learning 2022.04.08 2025.05.28 Literature Database
Distributed data analytics Authors: Richard Mortier, Hamed Haddadi, Sandra Servia, Liang Wang | Published: 2022-03-26 Backdoor AttackPrivacy ProtectionCommunication Model 2022.03.26 2025.05.28 Literature Database