Picture for Ninghui Li

Ninghui Li

Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape - A Survey

Add code
May 06, 2024
Viaarxiv icon

Towards Principled Assessment of Tabular Data Synthesis Algorithms

Add code
Feb 09, 2024
Viaarxiv icon

MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training

Add code
Nov 02, 2023
Viaarxiv icon

Differentially Private Vertical Federated Clustering

Add code
Aug 02, 2022
Figure 1 for Differentially Private Vertical Federated Clustering
Figure 2 for Differentially Private Vertical Federated Clustering
Figure 3 for Differentially Private Vertical Federated Clustering
Figure 4 for Differentially Private Vertical Federated Clustering
Viaarxiv icon

Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models

Add code
Jan 23, 2022
Figure 1 for Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
Figure 2 for Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
Figure 3 for Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
Figure 4 for Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
Viaarxiv icon

Black-box Model Inversion Attribute Inference Attacks on Classification Models

Add code
Dec 07, 2020
Figure 1 for Black-box Model Inversion Attribute Inference Attacks on Classification Models
Figure 2 for Black-box Model Inversion Attribute Inference Attacks on Classification Models
Figure 3 for Black-box Model Inversion Attribute Inference Attacks on Classification Models
Figure 4 for Black-box Model Inversion Attribute Inference Attacks on Classification Models
Viaarxiv icon

Continuous Release of Data Streams under both Centralized and Local Differential Privacy

Add code
May 24, 2020
Figure 1 for Continuous Release of Data Streams under both Centralized and Local Differential Privacy
Figure 2 for Continuous Release of Data Streams under both Centralized and Local Differential Privacy
Figure 3 for Continuous Release of Data Streams under both Centralized and Local Differential Privacy
Figure 4 for Continuous Release of Data Streams under both Centralized and Local Differential Privacy
Viaarxiv icon

Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap

Add code
Feb 27, 2020
Figure 1 for Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap
Figure 2 for Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap
Figure 3 for Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap
Figure 4 for Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap
Viaarxiv icon

Estimating Numerical Distributions under Local Differential Privacy

Add code
Dec 02, 2019
Figure 1 for Estimating Numerical Distributions under Local Differential Privacy
Figure 2 for Estimating Numerical Distributions under Local Differential Privacy
Figure 3 for Estimating Numerical Distributions under Local Differential Privacy
Figure 4 for Estimating Numerical Distributions under Local Differential Privacy
Viaarxiv icon

Practical and Robust Privacy Amplification with Multi-Party Differential Privacy

Add code
Aug 30, 2019
Figure 1 for Practical and Robust Privacy Amplification with Multi-Party Differential Privacy
Figure 2 for Practical and Robust Privacy Amplification with Multi-Party Differential Privacy
Figure 3 for Practical and Robust Privacy Amplification with Multi-Party Differential Privacy
Figure 4 for Practical and Robust Privacy Amplification with Multi-Party Differential Privacy
Viaarxiv icon