The Devil is in the GAN: Backdoor Attacks and Defenses in Deep Generative ModelsAmbrish RawatKillian Levacheret al.2022ESORICS 2022
Advances, challenges and opportunities in creating data for trustworthy AIWeixin LiangGirmaw Abebe Tadesseet al.2022Nature Machine Intelligence
Smart Home Privacy Policies Demystified: A Study of Availability, Content, and CoverageSunil ManandharKaushal Kafleet al.2022USENIX Security 2022
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge ProtocolsPankaj DayamaArpita Patraet al.2022PETS 2022
Federated Unlearning: How to Efficiently Erase a Client in FL?Anisa HalimiSwanand Ravindra Kadheet al.2022ICML 2022
A methodology for training homomorphic encryption friendly neural networksMoran BaruchNir Druckeret al.2022SiMLA 2022
Privacy-preserving record linkage using local sensitive hash and private set intersectionAllon AdirEhud Aharoniet al.2022Cloud S&P 2022
An End-to-end Framework for Privacy Risk Assessment of AI ModelsAbigail GoldsteenShlomit Shachoret al.2022SYSTOR 2022
Applying Artificial Intelligence Privacy Technology in the Healthcare DomainAbigail GoldsteenAriel Farkashet al.2022MIE 2022