BlockFLow: An Accountable and Privacy-Preserving Solution for Federated Learning Authors: Vaikkunth Mugunthan, Ravi Rahman, Lalana Kagal | Published: 2020-07-08 Performance EvaluationPrivacy AssessmentAttack Pattern Extraction 2020.07.08 2025.05.28 Literature Database
Sharing Models or Coresets: A Study based on Membership Inference Attack Authors: Hanlin Lu, Changchang Liu, Ting He, Shiqiang Wang, Kevin S. Chan | Published: 2020-07-06 Core Set ConstructionPrivacy AssessmentMembership Inference 2020.07.06 2025.05.28 Literature Database
PPaaS: Privacy Preservation as a Service Authors: Pathum Chamikara Mahawaga Arachchige, Peter Bertok, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe | Published: 2020-07-04 | Updated: 2021-04-21 Data Sanitization in PPaaSData ObfuscationPrivacy Assessment 2020.07.04 2025.05.28 Literature Database
On the Effectiveness of Regularization Against Membership Inference Attacks Authors: Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras | Published: 2020-06-09 Privacy AssessmentImprovement of LearningDefense Effectiveness Analysis 2020.06.09 2025.05.28 Literature Database
Secure Byzantine-Robust Machine Learning Authors: Lie He, Sai Praneeth Karimireddy, Martin Jaggi | Published: 2020-06-08 | Updated: 2020-10-18 MPC AlgorithmPrivacy AssessmentFederated Learning 2020.06.08 2025.05.28 Literature Database
ARIANN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing Authors: Théo Ryffel, Pierre Tholoniat, David Pointcheval, Francis Bach | Published: 2020-06-08 | Updated: 2021-10-28 AlgorithmPrivacy AssessmentFederated Learning System 2020.06.08 2025.05.28 Literature Database
AutoPrivacy: Automated Layer-wise Parameter Selection for Secure Neural Network Inference Authors: Qian Lou, Song Bian, Lei Jiang | Published: 2020-06-07 | Updated: 2020-10-15 Performance EvaluationPrivacy AssessmentEncryption Method 2020.06.07 2025.05.28 Literature Database
DarKnight: A Data Privacy Scheme for Training and Inference of Deep Neural Networks Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2020-06-01 | Updated: 2020-10-15 Data Protection MethodPrivacy AssessmentComputational Consistency 2020.06.01 2025.05.28 Literature Database
Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms Authors: Mohsen Minaei, S Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate | Published: 2020-05-28 Data Protection MethodPrivacy AssessmentAdversarial Attack Methods 2020.05.28 2025.05.28 Literature Database
Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users Authors: Ferenc Béres, István András Seres, András A. Benczúr, Mikerah Quintyne-Collins | Published: 2020-05-28 | Updated: 2020-10-13 Transaction PrioritizationPrivacy AssessmentFraudulent Transaction 2020.05.28 2025.05.28 Literature Database