Privacy Technique

Perfectly Secure Steganography Using Minimum Entropy Coupling

Authors: Christian Schroeder de Witt, Samuel Sokota, J. Zico Kolter, Jakob Foerster, Martin Strohmeier | Published: 2022-10-24 | Updated: 2023-10-30
Privacy Technique
Watermark Evaluation
Communication Model

Android Private Compute Core Architecture

Authors: Eugenio Marchiori, Sarah de Haas, Sergey Volnov, Ronnie Falcon, Roxanne Pinto, Marco Zamarato | Published: 2022-09-21 | Updated: 2022-09-22
Privacy Protection
Privacy Technique
Dynamic Access Control

Audit and Improve Robustness of Private Neural Networks on Encrypted Data

Authors: Jiaqi Xue, Lei Xu, Lin Chen, Weidong Shi, Kaidi Xu, Qian Lou | Published: 2022-09-20
DNN IP Protection Method
Privacy Technique

Verifiable Encodings for Secure Homomorphic Analytics

Authors: Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux | Published: 2022-07-28 | Updated: 2024-06-04
Privacy Technique
Performance Evaluation Metrics
Evaluation Method

Fine-grained Private Knowledge Distillation

Authors: Yuntong Li, Shaowei Wang, Yingying Wang, Jin Li, Yuqiu Qian, Bangzhou Xin, Wei Yang | Published: 2022-07-27 | Updated: 2023-04-06
Privacy Technique
Adversarial Example
Machine Learning

Additive Logistic Mechanism for Privacy-Preserving Self-Supervised Learning

Authors: Yunhao Yang, Parham Gohari, Ufuk Topcu | Published: 2022-05-25
Privacy Technique
Privacy Assessment
Function Definition

PrivFairFL: Privacy-Preserving Group Fairness in Federated Learning

Authors: Sikha Pentyala, Nicola Neophytou, Anderson Nascimento, Martine De Cock, Golnoosh Farnadi | Published: 2022-05-23 | Updated: 2022-08-26
Privacy Technique
Fairness evaluation
Statistical Methods

Differential Privacy: What is all the noise about?

Authors: Roxana Danger | Published: 2022-05-19
DP-SGD
Privacy Technique
Poisoning

On the (In)security of Peer-to-Peer Decentralized Machine Learning

Authors: Dario Pasquini, Mathilde Raynal, Carmela Troncoso | Published: 2022-05-17 | Updated: 2023-11-10
Attack Methods against DFL
Privacy Technique
Privacy Leakage

Privacy-Preserving Distributed Machine Learning Made Faster

Authors: Zoe L. Jiang, Jiajing Gu, Hongxiao Wang, Yulin Wu, Junbin Fang, Siu-Ming Yiu, Wenjian Luo, Xuan Wang | Published: 2022-05-12
Privacy Technique
Evaluation Method
Function Definition