SoK: Differential Privacy on Graph-Structured Data Authors: Tamara T. Mueller, Dmitrii Usynin, Johannes C. Paetzold, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-17 Graph PrivacyPrivacy ProtectionPrivacy Analysis 2022.03.17 2025.05.28 Literature Database
A Low-Cost Machine Learning Based Network Intrusion Detection System with Data Privacy Preservation Authors: Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael N. Johnstone, Wencheng Yang | Published: 2021-07-06 Privacy AnalysisModel Performance EvaluationMachine Learning Technology 2021.07.06 2025.05.28 Literature Database
Optimizing the Numbers of Queries and Replies in Federated Learning with Differential Privacy Authors: Yipeng Zhou, Xuezheng Liu, Yao Fu, Di Wu, Chao Li, Shui Yu | Published: 2021-07-05 Privacy Enhancing ProtocolPrivacy AnalysisFederated Learning 2021.07.05 2025.05.28 Literature Database
Certifiably Robust Interpretation via Renyi Differential Privacy Authors: Ao Liu, Xiaoyu Chen, Sijia Liu, Lirong Xia, Chuang Gan | Published: 2021-07-04 Privacy AnalysisRobustnessComputational Efficiency 2021.07.04 2025.05.28 Literature Database
Differentially Private Collaborative Intrusion Detection Systems For VANETs Authors: Tao Zhang, Quanyan Zhu | Published: 2020-05-02 AlgorithmPrivacy AnalysisPrivacy Assessment 2020.05.02 2025.05.28 Literature Database
Differentially Private Federated Learning with Laplacian Smoothing Authors: Zhicong Liang, Bao Wang, Quanquan Gu, Stanley Osher, Yuan Yao | Published: 2020-05-01 | Updated: 2021-09-10 Privacy AnalysisPrivacy AssessmentFederated Learning System 2020.05.01 2025.05.28 Literature Database
Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting Authors: Samuel Yeom, Irene Giacomelli, Matt Fredrikson, Somesh Jha | Published: 2017-09-05 | Updated: 2018-05-04 Privacy AnalysisPrivacy LeakageMembership Inference 2017.09.05 2025.05.28 Literature Database