Privacy Assessment

Incentivising the federation: gradient-based metrics for data selection and valuation in private decentralised training

Authors: Dmitrii Usynin, Daniel Rueckert, Georgios Kaissis | Published: 2023-05-04 | Updated: 2024-04-16
DNN IP Protection Method
Sample Complexity
Privacy Assessment

GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference

Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello | Published: 2023-05-01 | Updated: 2024-08-14
Watermarking
Privacy Assessment
Feature Extraction Method

Private Information Retrieval and Its Applications: An Introduction, Open Problems, Future Directions

Authors: Sajani Vithana, Zhusheng Wang, Sennur Ulukus | Published: 2023-04-27
Basic Concept of PIR
Privacy Assessment
Information-Theoretic Privacy

C2PI: An Efficient Crypto-Clear Two-Party Neural Network Private Inference

Authors: Yuke Zhang, Dake Chen, Souvik Kundu, Haomei Liu, Ruiheng Peng, Peter A. Beerel | Published: 2023-04-26
DNN IP Protection Method
Watermarking
Privacy Assessment

(Local) Differential Privacy has NO Disparate Impact on Fairness

Authors: Héber H. Arcolezi, Karima Makhlouf, Catuscia Palamidessi | Published: 2023-04-25 | Updated: 2023-08-01
Privacy Assessment
Fairness evaluation
Optimization Methods

Have it your way: Individualized Privacy Assignment for DP-SGD

Authors: Franziska Boenisch, Christopher Mühl, Adam Dziedzic, Roy Rinberg, Nicolas Papernot | Published: 2023-03-29 | Updated: 2024-01-19
Customization Method
Privacy Protection Method
Privacy Assessment

On the Query Complexity of Training Data Reconstruction in Private Learning

Authors: Prateeti Mukherjee, Satya Lokam | Published: 2023-03-29 | Updated: 2024-01-11
Privacy Protection Method
Privacy Analysis
Privacy Assessment

XRand: Differentially Private Defense against Explanation-Guided Attacks

Authors: Truc Nguyen, Phung Lai, NhatHai Phan, My T. Thai | Published: 2022-12-08 | Updated: 2022-12-14
Privacy Assessment
Method for Providing Explainability while Keeping Model Information Confidential
Differential Privacy

Vicious Classifiers: Assessing Inference-time Data Reconstruction Risk in Edge Computing

Authors: Mohammad Malekzadeh, Deniz Gunduz | Published: 2022-12-08 | Updated: 2024-10-01
Privacy Risk Management
Privacy Assessment
Reconstruction Durability

StyleGAN as a Utility-Preserving Face De-identification Method

Authors: Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh | Published: 2022-12-05 | Updated: 2023-08-31
Privacy Protection Method
Privacy Assessment
Face Recognition Method