プライバシー保護手法

Near Exact Privacy Amplification for Matrix Mechanisms

Authors: Christopher A. Choquette-Choo, Arun Ganesh, Saminul Haque, Thomas Steinke, Abhradeep Thakurta | Published: 2024-10-08 | Updated: 2025-03-20
プライバシー保護
プライバシー保護手法

KnowledgeSG: Privacy-Preserving Synthetic Text Generation with Knowledge Distillation from Server

Authors: Wenhao Wang, Xiaoyu Liang, Rui Ye, Jingyi Chai, Siheng Chen, Yanfeng Wang | Published: 2024-10-08 | Updated: 2024-10-10
プライバシー保護
プライバシー保護手法

A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers

Authors: Peng Tang, Xin Li, Yuxin Chen, Weidong Qiu, Haochen Mei, Allison Holmes, Fenghua Li, Shujun Li | Published: 2024-10-07
プライバシー保護
プライバシー保護手法
プライバシー手法

Adaptively Private Next-Token Prediction of Large Language Models

Authors: James Flemings, Meisam Razaviyayn, Murali Annavaram | Published: 2024-10-02
プライバシー保護
プライバシー保護手法
プライバシー手法

Scalable Differential Privacy Mechanisms for Real-Time Machine Learning Applications

Authors: Jessica Smith, David Williams, Emily Brown | Published: 2024-09-16
プライバシー保護
プライバシー保護手法
プライバシー手法

Federated Learning with Quantum Computing and Fully Homomorphic Encryption: A Novel Computing Paradigm Shift in Privacy-Preserving ML

Authors: Siddhant Dutta, Pavana P Karanth, Pedro Maciel Xavier, Iago Leal de Freitas, Nouhaila Innan, Sadok Ben Yahia, Muhammad Shafique, David E. Bernal Neira | Published: 2024-09-14 | Updated: 2024-10-12
プライバシー保護
プライバシー保護手法
量子フレームワーク

Exploring User-level Gradient Inversion with a Diffusion Prior

Authors: Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Bradley Malin, Kieran Parsons, Ye Wang | Published: 2024-09-11
ウォーターマーキング
プライバシー保護
プライバシー保護手法

Privacy-Preserving Data Linkage Across Private and Public Datasets for Collaborative Agriculture Research

Authors: Osama Zafar, Rosemarie Santa Gonzalez, Gabriel Wilkins, Alfonso Morales, Erman Ayday | Published: 2024-09-09
プライバシー保護
プライバシー保護手法
農業データプライバシー

Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm?

Authors: Rui Wen, Michael Backes, Yang Zhang | Published: 2024-09-05
バックドア攻撃
プライバシー保護手法
メンバーシップ推論

Defending against Model Inversion Attacks via Random Erasing

Authors: Viet-Hung Tran, Ngoc-Bao Nguyen, Son T. Mai, Hans Vandierendonck, Ngai-man Cheung | Published: 2024-09-02
ウォーターマーキング
プライバシー保護手法
防御手法