Perfectly Secure Steganography Using Minimum Entropy Coupling Authors: Christian Schroeder de Witt, Samuel Sokota, J. Zico Kolter, Jakob Foerster, Martin Strohmeier | Published: 2022-10-24 | Updated: 2023-10-30 Privacy TechniqueWatermark EvaluationCommunication Model 2022.10.24 2025.05.28 Literature Database
Android Private Compute Core Architecture Authors: Eugenio Marchiori, Sarah de Haas, Sergey Volnov, Ronnie Falcon, Roxanne Pinto, Marco Zamarato | Published: 2022-09-21 | Updated: 2022-09-22 Privacy ProtectionPrivacy TechniqueDynamic Access Control 2022.09.21 2025.05.28 Literature Database
Audit and Improve Robustness of Private Neural Networks on Encrypted Data Authors: Jiaqi Xue, Lei Xu, Lin Chen, Weidong Shi, Kaidi Xu, Qian Lou | Published: 2022-09-20 DNN IP Protection MethodPrivacy Technique 2022.09.20 2025.05.28 Literature Database
Verifiable Encodings for Secure Homomorphic Analytics Authors: Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux | Published: 2022-07-28 | Updated: 2024-06-04 Privacy TechniquePerformance Evaluation MetricsEvaluation Method 2022.07.28 2025.05.28 Literature Database
Fine-grained Private Knowledge Distillation Authors: Yuntong Li, Shaowei Wang, Yingying Wang, Jin Li, Yuqiu Qian, Bangzhou Xin, Wei Yang | Published: 2022-07-27 | Updated: 2023-04-06 Privacy TechniqueAdversarial ExampleMachine Learning 2022.07.27 2025.05.28 Literature Database
Additive Logistic Mechanism for Privacy-Preserving Self-Supervised Learning Authors: Yunhao Yang, Parham Gohari, Ufuk Topcu | Published: 2022-05-25 Privacy TechniquePrivacy AssessmentFunction Definition 2022.05.25 2025.05.28 Literature Database
PrivFairFL: Privacy-Preserving Group Fairness in Federated Learning Authors: Sikha Pentyala, Nicola Neophytou, Anderson Nascimento, Martine De Cock, Golnoosh Farnadi | Published: 2022-05-23 | Updated: 2022-08-26 Privacy TechniqueFairness evaluationStatistical Methods 2022.05.23 2025.05.28 Literature Database
Differential Privacy: What is all the noise about? Authors: Roxana Danger | Published: 2022-05-19 DP-SGDPrivacy TechniquePoisoning 2022.05.19 2025.05.28 Literature Database
On the (In)security of Peer-to-Peer Decentralized Machine Learning Authors: Dario Pasquini, Mathilde Raynal, Carmela Troncoso | Published: 2022-05-17 | Updated: 2023-11-10 Attack Methods against DFLPrivacy TechniquePrivacy Leakage 2022.05.17 2025.05.28 Literature Database
Privacy-Preserving Distributed Machine Learning Made Faster Authors: Zoe L. Jiang, Jiajing Gu, Hongxiao Wang, Yulin Wu, Junbin Fang, Siu-Ming Yiu, Wenjian Luo, Xuan Wang | Published: 2022-05-12 Privacy TechniqueEvaluation MethodFunction Definition 2022.05.12 2025.05.28 Literature Database