Picture for Yunhui Long

Yunhui Long

SoK: Privacy-Preserving Data Synthesis

Add code
Jul 05, 2023
Viaarxiv icon

Uncovering the Connection Between Differential Privacy and Certified Robustness of Federated Learning against Poisoning Attacks

Add code
Sep 08, 2022
Figure 1 for Uncovering the Connection Between Differential Privacy and Certified Robustness of Federated Learning against Poisoning Attacks
Figure 2 for Uncovering the Connection Between Differential Privacy and Certified Robustness of Federated Learning against Poisoning Attacks
Figure 3 for Uncovering the Connection Between Differential Privacy and Certified Robustness of Federated Learning against Poisoning Attacks
Figure 4 for Uncovering the Connection Between Differential Privacy and Certified Robustness of Federated Learning against Poisoning Attacks
Viaarxiv icon

Privacy of Autonomous Vehicles: Risks, Protection Methods, and Future Directions

Add code
Sep 08, 2022
Figure 1 for Privacy of Autonomous Vehicles: Risks, Protection Methods, and Future Directions
Figure 2 for Privacy of Autonomous Vehicles: Risks, Protection Methods, and Future Directions
Figure 3 for Privacy of Autonomous Vehicles: Risks, Protection Methods, and Future Directions
Figure 4 for Privacy of Autonomous Vehicles: Risks, Protection Methods, and Future Directions
Viaarxiv icon

SecretGen: Privacy Recovery on Pre-Trained Models via Distribution Discrimination

Add code
Jul 25, 2022
Figure 1 for SecretGen: Privacy Recovery on Pre-Trained Models via Distribution Discrimination
Figure 2 for SecretGen: Privacy Recovery on Pre-Trained Models via Distribution Discrimination
Figure 3 for SecretGen: Privacy Recovery on Pre-Trained Models via Distribution Discrimination
Figure 4 for SecretGen: Privacy Recovery on Pre-Trained Models via Distribution Discrimination
Viaarxiv icon

LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis

Add code
Aug 20, 2021
Figure 1 for LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis
Figure 2 for LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis
Figure 3 for LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis
Figure 4 for LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis
Viaarxiv icon

DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation

Add code
Mar 20, 2021
Figure 1 for DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation
Figure 2 for DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation
Figure 3 for DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation
Figure 4 for DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation
Viaarxiv icon

Scalable Differentially Private Generative Student Model via PATE

Add code
Jun 21, 2019
Figure 1 for Scalable Differentially Private Generative Student Model via PATE
Figure 2 for Scalable Differentially Private Generative Student Model via PATE
Figure 3 for Scalable Differentially Private Generative Student Model via PATE
Figure 4 for Scalable Differentially Private Generative Student Model via PATE
Viaarxiv icon

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition

Add code
Jul 02, 2018
Figure 1 for CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Figure 2 for CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Figure 3 for CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Figure 4 for CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Viaarxiv icon

Understanding Membership Inferences on Well-Generalized Learning Models

Add code
Feb 13, 2018
Figure 1 for Understanding Membership Inferences on Well-Generalized Learning Models
Figure 2 for Understanding Membership Inferences on Well-Generalized Learning Models
Figure 3 for Understanding Membership Inferences on Well-Generalized Learning Models
Figure 4 for Understanding Membership Inferences on Well-Generalized Learning Models
Viaarxiv icon