Privacy Protection

Privacy and Integrity Preserving Training Using Trusted Hardware

Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2021-05-01
Data Privacy Assessment
Data Integrity Constraints
Privacy Protection

Improved Matrix Gaussian Mechanism for Differential Privacy

Authors: Jungang Yang, Liyao Xiang, Weiting Li, Wei Liu, Xinbing Wang | Published: 2021-04-30
Data Privacy Assessment
Privacy Protection
Statistical Methods

Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model’s Complexity

Authors: Mathias P. M. Parisot, Balazs Pejo, Dayana Spagnuelo | Published: 2021-04-27
Data Privacy Assessment
Privacy Protection
Model Performance Evaluation

Collaborative Information Sharing for ML-Based Threat Detection

Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Alastair Nottingham, Jason Hiser, Jack Davidson | Published: 2021-04-23
Privacy Protection
Machine Learning Technology
Threat Model

Encrypted Distributed Lasso for Sparse Data Predictive Control

Authors: Andreea B. Alexandru, Anastasios Tsiamis, George J. Pappas | Published: 2021-04-23
Privacy Protection
Encryption Technology
Optimization Problem

CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU

Authors: Sijun Tan, Brian Knott, Yuan Tian, David J. Wu | Published: 2021-04-22
Privacy Protection
Model Design
Encryption Technology

Vectorized Secure Evaluation of Decision Forests

Authors: Raghav Malik, Vidush Singhal, Benjamin Gottfried, Milind Kulkarni | Published: 2021-04-19
Privacy Protection
Model Design
Encryption Technology

Privacy-preserving Federated Learning based on Multi-key Homomorphic Encryption

Authors: Jing Ma, Si-Ahmed Naas, Stephan Sigg, Xixiang Lyu | Published: 2021-04-14
Privacy Protection
Distributed Learning
Encryption Technology

Towards Causal Federated Learning For Enhanced Robustness and Privacy

Authors: Sreya Francis, Irene Tenison, Irina Rish | Published: 2021-04-14
Privacy Protection
Poisoning
Threat Model

TenSEAL: A Library for Encrypted Tensor Operations Using Homomorphic Encryption

Authors: Ayoub Benaissa, Bilal Retiat, Bogdan Cebere, Alaa Eddine Belfedhal | Published: 2021-04-07 | Updated: 2021-04-28
Privacy Protection
Encryption Technology
Machine Learning Technology