プライバシー保護技術

Just Fine-tune Twice: Selective Differential Privacy for Large Language Models

Authors: Weiyan Shi, Ryan Shea, Si Chen, Chiyuan Zhang, Ruoxi Jia, Zhou Yu | Published: 2022-04-15 | Updated: 2022-10-27
プライバシー保護技術
機械学習の応用
秘密検出器

Distributed learning optimisation of Cox models can leak patient data: Risks and solutions

Authors: Carsten Brink, Christian Rønn Hansen, Matthew Field, Gareth Price, David Thwaites, Nis Sarup, Uffe Bernchou, Lois Holloway | Published: 2022-04-12
プライバシー保護技術
機械学習の応用

User-Level Differential Privacy against Attribute Inference Attack of Speech Emotion Recognition in Federated Learning

Authors: Tiantian Feng, Raghuveer Peri, Shrikanth Narayanan | Published: 2022-04-05 | Updated: 2022-05-17
プライバシー保護メカニズム
プライバシー保護技術
プライバシー評価

Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data

Authors: John Lim, Jan-Michael Frahm, Fabian Monrose | Published: 2022-04-05
データセット生成
プライバシー保護技術
機械学習

Production of Categorical Data Verifying Differential Privacy: Conception and Applications to Machine Learning

Authors: Héber H. Arcolezi | Published: 2022-04-02
プライバシー保護プロトコル
プライバシー保護技術
プライバシー評価

Privacy-Preserving Aggregation in Federated Learning: A Survey

Authors: Ziyao Liu, Jiale Guo, Wenzhuo Yang, Jiani Fan, Kwok-Yan Lam, Jun Zhao | Published: 2022-03-31 | Updated: 2022-07-13
プライバシー保護プロトコル
プライバシー保護技術
ポイズニング

Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems

Authors: Min Wang, Song Wang, Jiankun Hu | Published: 2022-03-31
EEGバイオメトリクス
プライバシー保護技術
信号解析

Semi-FedSER: Semi-supervised Learning for Speech Emotion Recognition On Federated Learning using Multiview Pseudo-Labeling

Authors: Tiantian Feng, Shrikanth Narayanan | Published: 2022-03-15
データセット評価
プライバシー保護技術
半教師あり学習

A Framework for Verifiable and Auditable Federated Anomaly Detection

Authors: Gabriele Santin, Inna Skarbovsky, Fabiana Fournier, Bruno Lepri | Published: 2022-03-15
トレーニングプロトコル
プライバシー保護技術
ブロックチェーン統合

The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining

Authors: Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li | Published: 2022-03-14
トレーニングプロトコル
プライバシー保護技術
最適化手法