Federated Learning Nodes Can Reconstruct Peers’ Image Data Authors: Ethan Wilson, Kai Yue, Chau-Wai Wong, Huaiyu Dai | Published: 2024-10-07 Privacy ProtectionPoisoning 2024.10.07 2025.05.27 Literature Database
DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech Authors: Dominika Woszczyk, Soteris Demetriou | Published: 2024-10-05 LLM Performance EvaluationPrivacy Protection 2024.10.05 2025.05.27 Literature Database
pFedGame — Decentralized Federated Learning using Game Theory in Dynamic Topology Authors: Monik Raj Behera, Suchetana Chakraborty | Published: 2024-10-05 Simulation Result EvaluationPrivacy Protection 2024.10.05 2025.05.27 Literature Database
An Intelligent Quantum Cyber-Security Framework for Healthcare Data Management Authors: Kishu Gupta, Deepika Saxena, Pooja Rani, Jitendra Kumar, Aaisha Makkar, Ashutosh Kumar Singh, Chung-Nan Lee | Published: 2024-10-04 Privacy ProtectionQuantum FrameworkQuantum Cryptography Technology 2024.10.04 2025.05.27 Literature Database
Adaptively Private Next-Token Prediction of Large Language Models Authors: James Flemings, Meisam Razaviyayn, Murali Annavaram | Published: 2024-10-02 Privacy ProtectionPrivacy Protection MethodPrivacy Technique 2024.10.02 2025.05.27 Literature Database
An interdisciplinary exploration of trade-offs between energy, privacy and accuracy aspects of data Authors: Pepijn de Reus, Kyra Dresen, Ana Oprescu, Kristina Irion, Ans Kolk | Published: 2024-09-30 | Updated: 2024-10-12 Privacy ProtectionPrivacy Technique 2024.09.30 2025.05.27 Literature Database
Advances in APPFL: A Comprehensive and Extensible Federated Learning Framework Authors: Zilinghan Li, Shilan He, Ze Yang, Minseok Ryu, Kibaek Kim, Ravi Madduri | Published: 2024-09-17 Privacy ProtectionFrameworkCommunication Efficiency 2024.09.17 2025.05.27 Literature Database
Federated Learning for Smart Grid: A Survey on Applications and Potential Vulnerabilities Authors: Zikai Zhang, Suman Rath, Jiaohao Xu, Tingsong Xiao | Published: 2024-09-16 Energy ManagementPrivacy ProtectionPoisoning 2024.09.16 2025.05.27 Literature Database
Scalable Differential Privacy Mechanisms for Real-Time Machine Learning Applications Authors: Jessica Smith, David Williams, Emily Brown | Published: 2024-09-16 Privacy ProtectionPrivacy Protection MethodPrivacy Technique 2024.09.16 2025.05.27 Literature Database
A Large-Scale Privacy Assessment of Android Third-Party SDKs Authors: Mark Huasong Meng, Chuan Yan, Yun Hao, Qing Zhang, Zeyu Wang, Kailong Wang, Sin Gee Teo, Guangdong Bai, Jin Song Dong | Published: 2024-09-16 SDK Data CollectionPrivacy ProtectionPrivacy Classification 2024.09.16 2025.05.27 Literature Database