Differentially Private Over-the-Air Federated Learning Over MIMO Fading Channels Authors: Hang Liu, Jia Yan, Ying-Jun Angela Zhang | Published: 2023-06-19 | Updated: 2023-12-25 Privacy TechniqueOptimization MethodsFederated Learning 2023.06.19 2025.05.28 Literature Database
PLAN: Variance-Aware Private Mean Estimation Authors: Martin Aumüller, Christian Janos Lebeda, Boel Nelson, Rasmus Pagh | Published: 2023-06-14 | Updated: 2024-04-10 AlgorithmPrivacy TechniqueComputational Efficiency 2023.06.14 2025.05.28 Literature Database
Fairness and Privacy-Preserving in Federated Learning: A Survey Authors: Taki Hasan Rafi, Faiza Anan Noor, Tahmid Hussain, Dong-Kyu Chae | Published: 2023-06-14 | Updated: 2023-07-14 Privacy TechniquePoisoningFederated Learning 2023.06.14 2025.05.28 Literature Database
Protecting User Privacy in Remote Conversational Systems: A Privacy-Preserving framework based on text sanitization Authors: Zhigang Kan, Linbo Qiao, Hao Yu, Liwen Peng, Yifu Gao, Dongsheng Li | Published: 2023-06-14 Data Protection MethodPrivacy TechniqueInformation Extraction 2023.06.14 2025.05.28 Literature Database
Differentially Private One Permutation Hashing and Bin-wise Consistent Weighted Sampling Authors: Xiaoyun Li, Ping Li | Published: 2023-06-13 Data Privacy AssessmentData Protection MethodPrivacy Technique 2023.06.13 2025.05.28 Literature Database
“Private Prediction Strikes Back!” Private Kernelized Nearest Neighbors with Individual Renyi Filter Authors: Yuqing Zhu, Xuandong Zhao, Chuan Guo, Yu-Xiang Wang | Published: 2023-06-12 Data Privacy AssessmentHyperparameter TuningPrivacy Technique 2023.06.12 2025.05.28 Literature Database
Gaussian Membership Inference Privacy Authors: Tobias Leemann, Martin Pawelczyk, Gjergji Kasneci | Published: 2023-06-12 | Updated: 2023-10-26 Privacy TechniqueHypothesis TestingStatistical Testing 2023.06.12 2025.05.28 Literature Database
AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning Authors: Ghada Almashaqbeh, Zahra Ghodsi | Published: 2023-06-12 Privacy TechniqueMalicious ClientFederated Learning 2023.06.12 2025.05.28 Literature Database
Efficient Skip Connections Realization for Secure Inference on Encrypted Data Authors: Nir Drucker, Itamar Zimerman | Published: 2023-06-11 Privacy TechniqueReal-Time InferencePerformance Evaluation 2023.06.11 2025.05.28 Literature Database
Killing Two Birds with One Stone: Quantization Achieves Privacy in Distributed Learning Authors: Guangfeng Yan, Tan Li, Kui Wu, Linqi Song | Published: 2023-04-26 DNN IP Protection MethodTraining ProtocolPrivacy Technique 2023.04.26 2025.05.28 Literature Database