Reinforcement Learning-Based Black-Box Model Inversion Attacks Authors: Gyojin Han, Jaehyun Choi, Haeil Lee, Junmo Kim | Published: 2023-04-10 DNN IP Protection MethodPrivacy TechniqueChallenges of Generative Models 2023.04.10 2025.05.28 Literature Database
Gradient Sparsification for Efficient Wireless Federated Learning with Differential Privacy Authors: Kang Wei, Jun Li, Chuan Ma, Ming Ding, Feng Shu, Haitao Zhao, Wen Chen, Hongbo Zhu | Published: 2023-04-09 | Updated: 2023-12-21 Client ClusteringPrivacy TechniqueOptimization Problem 2023.04.09 2025.05.28 Literature Database
Does Prompt-Tuning Language Model Ensure Privacy? Authors: Shangyu Xie, Wei Dai, Esha Ghosh, Sambuddha Roy, Dan Schwartz, Kim Laine | Published: 2023-04-07 | Updated: 2023-04-15 Privacy AnalysisPrivacy TechniqueAttack Evaluation 2023.04.07 2025.05.28 Literature Database
Perfectly Secure Steganography Using Minimum Entropy Coupling Authors: Christian Schroeder de Witt, Samuel Sokota, J. Zico Kolter, Jakob Foerster, Martin Strohmeier | Published: 2022-10-24 | Updated: 2023-10-30 Privacy TechniqueWatermark EvaluationCommunication Model 2022.10.24 2025.05.28 Literature Database
Android Private Compute Core Architecture Authors: Eugenio Marchiori, Sarah de Haas, Sergey Volnov, Ronnie Falcon, Roxanne Pinto, Marco Zamarato | Published: 2022-09-21 | Updated: 2022-09-22 Privacy ProtectionPrivacy TechniqueDynamic Access Control 2022.09.21 2025.05.28 Literature Database
Audit and Improve Robustness of Private Neural Networks on Encrypted Data Authors: Jiaqi Xue, Lei Xu, Lin Chen, Weidong Shi, Kaidi Xu, Qian Lou | Published: 2022-09-20 DNN IP Protection MethodPrivacy Technique 2022.09.20 2025.05.28 Literature Database
Verifiable Encodings for Secure Homomorphic Analytics Authors: Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux | Published: 2022-07-28 | Updated: 2024-06-04 Privacy TechniquePerformance Evaluation MetricsEvaluation Method 2022.07.28 2025.05.28 Literature Database
Fine-grained Private Knowledge Distillation Authors: Yuntong Li, Shaowei Wang, Yingying Wang, Jin Li, Yuqiu Qian, Bangzhou Xin, Wei Yang | Published: 2022-07-27 | Updated: 2023-04-06 Privacy TechniqueAdversarial ExampleMachine Learning 2022.07.27 2025.05.28 Literature Database
Additive Logistic Mechanism for Privacy-Preserving Self-Supervised Learning Authors: Yunhao Yang, Parham Gohari, Ufuk Topcu | Published: 2022-05-25 Privacy TechniquePrivacy AssessmentFunction Definition 2022.05.25 2025.05.28 Literature Database
PrivFairFL: Privacy-Preserving Group Fairness in Federated Learning Authors: Sikha Pentyala, Nicola Neophytou, Anderson Nascimento, Martine De Cock, Golnoosh Farnadi | Published: 2022-05-23 | Updated: 2022-08-26 Privacy TechniqueFairness evaluationStatistical Methods 2022.05.23 2025.05.28 Literature Database