Privacy Protection

Secure Machine Learning in the Cloud Using One Way Scrambling by Deconvolution

Authors: Yiftach Savransky, Roni Mateless, Gilad Katz | Published: 2021-11-04
Data Generation
Privacy Protection
Reconstruction Durability

A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection

Authors: Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann | Published: 2021-11-04
Dataset evaluation
Privacy Protection
Federated Learning

DP-XGBoost: Private Machine Learning at Scale

Authors: Nicolas Grislain, Joan Gonzalvez | Published: 2021-10-25
Algorithm Design
Privacy Protection
Machine Learning Algorithm

Addressing Privacy Threats from Machine Learning

Authors: Mary Anne Smart | Published: 2021-10-25
Privacy Protection
Human-Centered Approach
Role of Machine Learning

Differentially Private Coordinate Descent for Composite Empirical Risk Minimization

Authors: Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi | Published: 2021-10-22 | Updated: 2022-10-21
Algorithm Design
Privacy Protection
Machine Learning Method

PRECAD: Privacy-Preserving and Robust Federated Learning via Crypto-Aided Differential Privacy

Authors: Xiaolan Gu, Ming Li, Li Xiong | Published: 2021-10-22
Privacy Protection
Poisoning
Robustness Evaluation

Privacy in Open Search: A Review of Challenges and Solutions

Authors: Samuel Sousa, Christian Guetl, Roman Kern | Published: 2021-10-20 | Updated: 2022-04-04
Privacy Protection
Review and Investigation
Information Retrieval

GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks

Authors: Qiao Zhang, Chunsheng Xin, Hongyi Wu | Published: 2021-05-05
Data Management System
Privacy Protection
Optimization Methods

Citadel: Protecting Data Privacy and Model Confidentiality for Collaborative Learning with SGX

Authors: Chengliang Zhang, Junzhe Xia, Baichen Yang, Huancheng Puyang, Wei Wang, Ruichuan Chen, Istemi Ekin Akkus, Paarijaat Aditya, Feng Yan | Published: 2021-05-04 | Updated: 2021-11-08
Data Privacy Assessment
Data Protection Method
Privacy Protection

Quantifying the Tradeoff Between Cybersecurity and Location Privacy

Authors: Dajiang Suo, M. Elena Renda, Jinhua Zhao | Published: 2021-05-04 | Updated: 2021-12-10
Data Privacy Assessment
Data Protection Method
Privacy Protection