Dp-sniper: Black-box discovery of differential privacy violations using classifiers
We present DP-Sniper, a practical black-box method that automatically finds violations of
differential privacy. DP-Sniper is based on two key ideas:(i) training a classifier to predict if …
differential privacy. DP-Sniper is based on two key ideas:(i) training a classifier to predict if …
Security of IoT device: perspective forensic/anti-forensic issues on invalid area of NAND flash memory
NAND flash memory-based IoT device can potentially still leave behind original personal
data in an invalid area even if the data has been deleted. In this paper, we raise the forensic …
data in an invalid area even if the data has been deleted. In this paper, we raise the forensic …
Enabling Synthetic Data adoption in regulated domains
The switch from a Model-Centric to a Data-Centric mindset is putting emphasis on data and
its quality rather than algorithms, bringing forward new challenges. In particular, the …
its quality rather than algorithms, bringing forward new challenges. In particular, the …
RRN: A differential private approach to preserve privacy in image classification
Z Shen, T Zhong, H Sun, B Qi - IET Image Processing, 2023 - Wiley Online Library
The wide application of image classification has given rise to many intelligent systems, such
as face recognition systems, which makes our life more convenient. However, the ensuing …
as face recognition systems, which makes our life more convenient. However, the ensuing …
Towards more accurate and useful data anonymity vulnerability measures
P Francis, D Wagner - arxiv preprint arxiv:2403.06595, 2024 - arxiv.org
The purpose of anonymizing structured data is to protect the privacy of individuals in the
data while retaining the statistical properties of the data. There is a large body of work that …
data while retaining the statistical properties of the data. There is a large body of work that …
Meaningful insights: explainability techniques for black-box models on tabular data
G Visani - 2023 - amsdottorato.unibo.it
Artificial Intelligence (AI) and Machine Learning (ML) are novel data analysis techniques
providing very accurate prediction results. They are widely adopted in a variety of industries …
providing very accurate prediction results. They are widely adopted in a variety of industries …
“What did you say?”: Extracting unintentional secrets from predictive text learning systems
G Wilkinson, P Legg - … on Cyber Security and Protection of …, 2020 - ieeexplore.ieee.org
As a primary form of communication, text is used widely for online communications,
including e-mail conversations, mobile text messaging, chatroom and forum discussions …
including e-mail conversations, mobile text messaging, chatroom and forum discussions …
Fifty shades of personal data–Partial re-identification and GDPR
J Willemson - Annual Privacy Forum, 2022 - Springer
This paper takes a look at data re-identification as an economic game where the attacker is
assumed to be rational, ie performs attacks for a gain. In order to evaluate expectancy for …
assumed to be rational, ie performs attacks for a gain. In order to evaluate expectancy for …