Learning with Differential Privacy: Stability, Learnability and the Sufficiency and Necessity of ERM Principle

Authors: Yu-Xiang Wang, Jing Lei, Stephen E. Fienberg | Published: 2015-02-23 | Updated: 2016-04-27

PowerSpy: Location Tracking using Mobile Device Power Analysis

Authors: Yan Michalevsky, Gabi Nakibly, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh | Published: 2015-02-11 | Updated: 2015-08-18

Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices

Authors: Jihun Hamm, Adam Champion, Guoxing Chen, Mikhail Belkin, Dong Xuan | Published: 2015-01-11

Differential Privacy and Machine Learning: a Survey and Review

Authors: Zhanglong Ji, Zachary C. Lipton, Charles Elkan | Published: 2014-12-24

Towards Deep Neural Network Architectures Robust to Adversarial Examples

Authors: Shixiang Gu, Luca Rigazio | Published: 2014-12-11 | Updated: 2015-04-09

Understanding Deep Image Representations by Inverting Them

Authors: Aravindh Mahendran, Andrea Vedaldi | Published: 2014-11-26

Private Empirical Risk Minimization Beyond the Worst Case: The Effect of the Constraint Set Geometry

Authors: Kunal Talwar, Abhradeep Thakurta, Li Zhang | Published: 2014-11-20 | Updated: 2016-11-20

CONDENSER: A Graph-Based Approachfor Detecting Botnets

Authors: Pedro Camelo, Joao Moura, Ludwig Krippahl | Published: 2014-10-31

Anomaly Detection Framework Using Rule Extraction for Efficient Intrusion Detection

Authors: Antti Juvonen, Tuomo Sipola | Published: 2014-10-28

Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination

Authors: Amit Datta, Michael Carl Tschantz, Anupam Datta | Published: 2014-08-27 | Updated: 2015-03-17