A hybrid approach to privacy-preserving federated learning S Truex, N Baracaldo, A Anwar, T Steinke, H Ludwig, R Zhang, Y Zhou Proceedings of the 12th ACM workshop on artificial intelligence and security …, 2019 | 967 | 2019 |
Data poisoning attacks against federated learning systems V Tolpegin, S Truex, ME Gursoy, L Liu Computer security–ESORICs 2020: 25th European symposium on research in …, 2020 | 693 | 2020 |
Towards demystifying membership inference attacks S Truex, L Liu, ME Gursoy, L Yu, W Wei arXiv preprint arXiv:1807.09173, 2018 | 408* | 2018 |
LDP-Fed: Federated learning with local differential privacy S Truex, L Liu, KH Chow, ME Gursoy, W Wei Proceedings of the third ACM international workshop on edge systems …, 2020 | 378 | 2020 |
Differentially private model publishing for deep learning L Yu, L Liu, C Pu, ME Gursoy, S Truex 2019 IEEE symposium on security and privacy (SP), 332-349, 2019 | 304 | 2019 |
Tifl: A tier-based federated learning system Z Chai, A Ali, S Zawad, S Truex, A Anwar, N Baracaldo, Y Zhou, H Ludwig, ... Proceedings of the 29th international symposium on high-performance parallel …, 2020 | 278 | 2020 |
A framework for evaluating gradient leakage attacks in federated learning W Wei, L Liu, M Loper, KH Chow, ME Gursoy, S Truex, Y Wu arXiv preprint arXiv:2004.10397, 2020 | 157 | 2020 |
Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation M De Cock, R Dowsley, C Horst, R Katti, ACA Nascimento, WS Poon, ... IEEE Transactions on Dependable and Secure Computing 16 (2), 217-230, 2017 | 152 | 2017 |
Fast, privacy preserving linear regression over distributed datasets based on pre-distributed data M Cock, R Dowsley, ACA Nascimento, SC Newman Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security …, 2015 | 113 | 2015 |
Differentially private and utility preserving publication of trajectory data ME Gursoy, L Liu, S Truex, L Yu IEEE Transactions on Mobile Computing 18 (10), 2315-2329, 2018 | 110 | 2018 |
Utility-aware synthesis of differentially private and attack-resilient location traces ME Gursoy, L Liu, S Truex, L Yu, W Wei Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 100 | 2018 |
Secure and utility-aware data collection with condensed local differential privacy ME Gursoy, A Tamersoy, S Truex, W Wei, L Liu IEEE Transactions on Dependable and Secure Computing 18 (5), 2365-2378, 2019 | 96 | 2019 |
A framework for evaluating client privacy leakages in federated learning W Wei, L Liu, M Loper, KH Chow, ME Gursoy, S Truex, Y Wu Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 89 | 2020 |
Population cost prediction on public healthcare datasets S Sushmita, S Newman, J Marquardt, P Ram, V Prasad, MD Cock, ... Proceedings of the 5th international conference on digital health 2015, 87-94, 2015 | 81 | 2015 |
Deep neural network ensembles against deception: Ensemble diversity, accuracy and robustness L Liu, W Wei, KH Chow, M Loper, E Gursoy, S Truex, Y Wu 2019 IEEE 16th international conference on mobile ad hoc and sensor systems …, 2019 | 73 | 2019 |
Dynamic hierarchical classification for patient risk-of-readmission S Basu Roy, A Teredesai, K Zolfaghar, R Liu, D Hazel, S Newman, ... Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015 | 69 | 2015 |
Adversarial objectness gradient attacks in real-time object detection systems KH Chow, L Liu, M Loper, J Bae, ME Gursoy, S Truex, W Wei, Y Wu 2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020 | 68 | 2020 |
Effects of differential privacy and data skewness on membership inference vulnerability S Truex, L Liu, ME Gursoy, W Wei, L Yu 2019 First IEEE international conference on trust, privacy and security in …, 2019 | 48 | 2019 |
Predicting 30-day risk and cost of" all-cause" hospital readmissions S Sushmita, G Khulbe, A Hasan, S Newman, P Ravindra, SB Roy, ... Workshops at the thirtieth AAAI conference on artificial intelligence, 2016 | 42 | 2016 |
Adversarial examples in deep learning: Characterization and divergence W Wei, L Liu, M Loper, S Truex, L Yu, ME Gursoy, Y Wu arXiv preprint arXiv:1807.00051, 2018 | 30 | 2018 |