
In today’s world, machine learning (ML) algorithms are widely used to categorize and classify large amounts of data. Applications range from spam filtering over fraud detection, stock …
PoPETs Proceedings — SoK: Efficient Privacy-preserving Clustering
SoK: Efficient Privacy-preserving Clustering Authors: Aditya Hegde (IIIT-Bangalore), Helen Möllering (Technical University of Darmstadt), Thomas Schneider (Technical ...
Wouter Lueks*, Seda Gürses, Michael Veale, Edouard Bugnion, Marcel Salathé, Kenneth G. Paterson, and Carmela Troncoso
SoK: Privacy-Preserving Computation Techniques for Deep Learning
SoK: Privacy-Preserving Computation Techniques for Deep Learning Authors: José Cabrero-Holgueras (CERN/Universidad Carlos III de Madrid), Sergio Pastrana ...
Several available DL frameworks allow researchers and practitioners to train models using their data and use them internally in their local business processes [5– 7]. In this scenario, privacy …
*Corresponding Author: Alexandre Roy-Gaumond: UQAM, E-mail: [email protected]
Abstract:Camerasareeverywhere,andareincreasingly coupledwithvideoanalyticssoftwarethatcanidentify our face, track our mood, recognize what we …
We thank the following shepherds: Sébastien Gambs, Université du Québec à Montréal (UQAM) Thomas Gross, Newcastle University Dali Kaafar, Macquarie University- CSIRO Data61 …
1 Introduction Smart-home devices are increasingly popular despite their demonstrated security and privacy risks. Most of the risks studied so far are relevant to the people who purchase and …
WebGL abused for malicious intentions [17, 24]. Browser caches is one of such feature that has received a great deal of abuse over the years [19, 28, 29]. With the rise in the discussion on …