Subjects including, but not limited to, differential privacy, federated learning, and etc.
Doc.ai: Federated Learning in Healthcare link
Apple: Private Federated Learning link
title | topic | link |
---|---|---|
Average-Case Averages: Private Algorithms for Smooth Sensitivity and Mean Estimation | differential privacy | #86 link |
Capacity Bounded Differential Privacy | differential privacy | #87 link |
Differentially Private Anonymized Histograms | differential privacy | #88 link |
Differentially Private Bagging: Improved utility and cheaper privacy than subsample-and-aggregate | differntial privacy | #89 link |
Efficiently Estimating Erdos-Renyi Graphs with Node Differential Privacy | differential privacy | #91 link |
Locally Private Gaussian Estimation | differential privacy | #92 link |
Minimax Optimal Estimation of Approximate Differential Privacy on Neighboring Databases | differential privacy | #93 link |
Differentially Private Algorithms for Learning Mixtures of Separated Gaussians | differential privacy | #94 link |
Partially Encrypted Deep Learning using Functional Encryption | functional encryption | #95 link |
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation | multi-party computing | #96 link |
title | topic | poster |
---|---|---|
Online Learning via the Differential Privacy Lens | differential privacy | spotlight #53 link |
Limits of Private Learning with Access to Public Data | differential privacy | #225 link |
title | topic | poster |
---|---|---|
Private Stochastic Convex Optimization with Optimal Rates | differential privacy | spotlight # 163 link |
Practical Differentially Private Top-k Selection with Pay-what-you-get Composition | differential privacy | spotlight #161 link |
Private Learning Implies Online Learning: An Efficient Reduction | differential privacy | spotlight #24 link |
Differentially Private Markov Chain Monte Carlo | differential privacy | spotlight #158 link |
Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks | Vulnerability identification | #88 link |
Differentially Private Distributed Data Summarization under Covariate Shift | differential privacy | #89 link |
Private Hypothesis Selection | differential privacy | #90 link |
Facility Location Problem in Differential Privacy Model Revisited | differential privacy | #91 link |
KNG: The K-Norm Gradient Mechanism | differential privacy | #92 link |
Locally Private Learning without Interaction Requires Separation | differential privacy | #93 link |
On Differentially Private Graph Sparsification and Applications | differential privacy | #95 link |
Privacy-Preserving Q-Learning with Functional Noise in Continuous Spaces | differential privacy | #96 link |
SHE: A Fast and Accurate Deep Neural Network for Encrypted Data | encryption | #99 link |
An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors | differential privacy | #153 link |
Deep Leakage from Gradients | gradient leakage | #154 link |
Differential Privacy Has Disparate Impact on Model Accuracy | differential privacy | #156 link |
Differentially Private Covariance Estimation | differential privacy | #157 link |
Elliptical Perturbations for Differential Privacy | differential privacy | #159 link |
Oblivious Sampling Algorithms for Private Data Analysis | differential privacy | #160 link |
Privacy Amplification by Mixing and Diffusion Mechanisms | differential privacy | #162 link |
@ West 118 - 120
@ West 205 - 207
@ East Meeting Rooms 8 + 15
License
To the extent possible under law, Hongwei Jin has waived all copyright and related or neighboring rights to this work.