Differential Privacy

MOBIUS: Model-Oblivious Binarized Neural Networks

Authors: Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka | Published: 2018-11-29
Trigger Detection
Privacy-Preserving Machine Learning
Differential Privacy

Generalised Differential Privacy for Text Document Processing

Authors: Natasha Fernandes, Mark Dras, Annabelle McIver | Published: 2018-11-26 | Updated: 2019-02-05
Application of Text Classification
Model Inversion
Differential Privacy

A Fully Private Pipeline for Deep Learning on Electronic Health Records

Authors: Edward Chou, Thao Nguyen, Josh Beal, Albert Haque, Li Fei-Fei | Published: 2018-11-25
Watermarking Settings for Medical Data
Differential Privacy
Cryptographic Protocol

Biscotti: A Ledger for Private and Secure Peer-to-Peer Machine Learning

Authors: Muhammad Shayan, Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh | Published: 2018-11-24 | Updated: 2019-12-12
Poisoning Attack
Differential Privacy
Federated Learning

Private Selection from Private Candidates

Authors: Jingcheng Liu, Kunal Talwar | Published: 2018-11-19
Differential Privacy
Selection and Evaluation of Optimization Algorithms
Statistical Analysis

How to Use Heuristics for Differential Privacy

Authors: Seth Neel, Aaron Roth, Zhiwei Steven Wu | Published: 2018-11-19
Synthetic Data Generation
Differential Privacy
Selection and Evaluation of Optimization Algorithms

A Marauder’s Map of Security and Privacy in Machine Learning

Authors: Nicolas Papernot | Published: 2018-11-03
Challenges in IT Security
Quantification of Uncertainty
Differential Privacy

Privacy-Preserving Multiparty Learning For Logistic Regression

Authors: Wei Du, Ang Li, Qinghua Li | Published: 2018-10-04
Secure Logistic Regression
Privacy Risk Management
Differential Privacy

Privacy-Preserving Deep Learning via Weight Transmission

Authors: Le Trieu Phong, Tran Thi Phuong | Published: 2018-09-10 | Updated: 2019-02-12
Model Extraction Attack
Distributed Learning Platform
Differential Privacy

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection

Authors: Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren | Published: 2018-08-10 | Updated: 2021-11-16
Differential Privacy
Adversarial Example
Adversarial attack