Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems Authors: Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Yi | Published: 2023-04-26 Privacy TechniqueBlockchain IntegrationMulti-Party Computation 2023.04.26 2025.05.28 Literature Database
Censoring chemical data to mitigate dual use risk Authors: Quintina L. Campbell, Jonathan Herington, Andrew D. White | Published: 2023-04-20 Data GenerationPrivacy TechniqueSafety Alignment 2023.04.20 2025.05.28 Literature Database
Sensitivity estimation for differentially private query processing Authors: Meifan Zhang, Xin Liu, Lihua Yin | Published: 2023-04-19 Sampling MethodPrivacy TechniqueStatistical Methods 2023.04.19 2025.05.28 Literature Database
AI Product Security: A Primer for Developers Authors: Ebenezer R. H. P. Isaac, Jim Reno | Published: 2023-04-18 Security AnalysisPrivacy TechniqueCompliance with Ethical Guidelines 2023.04.18 2025.05.28 Literature Database
Crossing Roads of Federated Learning and Smart Grids: Overview, Challenges, and Perspectives Authors: Hafsa Bousbiat, Roumaysa Bousselidj, Yassine Himeur, Abbes Amira, Faycal Bensaali, Fodil Fadli, Wathiq Mansoor, Wilfried Elmenreich | Published: 2023-04-17 Energy-Based ModelSecurity AnalysisPrivacy Technique 2023.04.17 2025.05.28 Literature Database
A Randomized Approach for Tight Privacy Accounting Authors: Jiachen T. Wang, Saeed Mahloujifar, Tong Wu, Ruoxi Jia, Prateek Mittal | Published: 2023-04-17 | Updated: 2023-11-21 Privacy AnalysisPrivacy TechniqueStatistical Methods 2023.04.17 2025.05.28 Literature Database
Zero-Knowledge Proof-based Practical Federated Learning on Blockchain Authors: Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar | Published: 2023-04-12 | Updated: 2023-04-24 WatermarkingSecurity AnalysisPrivacy Technique 2023.04.12 2025.05.28 Literature Database
Privacy-Preserving Matrix Factorization for Recommendation Systems using Gaussian Mechanism Authors: Sohan Salahuddin Mugdho, Hafiz Imtiaz | Published: 2023-04-11 WatermarkingPrivacy AnalysisPrivacy Technique 2023.04.11 2025.05.28 Literature Database
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense Authors: Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu | Published: 2023-04-11 Trade-off AnalysisPrivacy TechniquePoisoning 2023.04.11 2025.05.28 Literature Database
Balancing Privacy and Performance for Private Federated Learning Algorithms Authors: Xiangjian Hou, Sarit Khirirat, Mohammad Yaqub, Samuel Horvath | Published: 2023-04-11 | Updated: 2023-08-18 Privacy TechniquePoisoningOptimization Methods 2023.04.11 2025.05.28 Literature Database