The evolution of distributed systems for graph neural networks and their origin in graph processing and deep learning: A survey

J Vatter, R Mayer, HA Jacobsen - ACM Computing Surveys, 2023 - dl.acm.org
Graph neural networks (GNNs) are an emerging research field. This specialized deep
neural network architecture is capable of processing graph structured data and bridges the …

Local differential privacy and its applications: A comprehensive survey

M Yang, T Guo, T Zhu, I Tjuawinata, J Zhao… - Computer Standards & …, 2023 - Elsevier
With the rapid development of low-cost consumer electronics and pervasive adoption of next
generation wireless communication technologies, a tremendous amount of data has been …

Privacy risk in machine learning: Analyzing the connection to overfitting

S Yeom, I Giacomelli, M Fredrikson… - 2018 IEEE 31st …, 2018 - ieeexplore.ieee.org
Machine learning algorithms, when applied to sensitive data, pose a distinct threat to
privacy. A growing body of prior work demonstrates that models produced by these …

Amplification by shuffling: From local to central differential privacy via anonymity

Ú Erlingsson, V Feldman, I Mironov… - Proceedings of the …, 2019 - SIAM
Sensitive statistics are often collected across sets of users, with repeated collection of
reports done over time. For example, trends in users' private preferences or software usage …

Membership inference attacks against machine learning models

R Shokri, M Stronati, C Song… - 2017 IEEE symposium …, 2017 - ieeexplore.ieee.org
We quantitatively investigate how machine learning models leak information about the
individual data records on which they were trained. We focus on the basic membership …

Logan: Membership inference attacks against generative models

J Hayes, L Melis, G Danezis, E De Cristofaro - arXiv preprint arXiv …, 2017 - arxiv.org
Generative models estimate the underlying distribution of a dataset to generate realistic
samples according to that distribution. In this paper, we present the first membership …

A survey on trustworthy recommender systems

Y Ge, S Liu, Z Fu, J Tan, Z Li, S Xu, Y Li, Y Xian… - ACM Transactions on …, 2022 - dl.acm.org
Recommender systems (RS), serving at the forefront of Human-centered AI, are widely
deployed in almost every corner of the web and facilitate the human decision-making …

Towards making systems forget with machine unlearning

Y Cao, J Yang - 2015 IEEE symposium on security and privacy, 2015 - ieeexplore.ieee.org
Today's systems produce a rapidly exploding amount of data, and the data further derives
more data, forming a complex data propagation network that we call the data's lineage …

[PDF][PDF] Membership inference attack against differentially private deep learning model.

MA Rahman, T Rahman, R Laganière, N Mohammed… - Trans. Data Priv., 2018 - tdp.cat
The unprecedented success of deep learning is largely dependent on the availability of
massive amount of training data. In many cases, these data are crowd-sourced and may …

Poisoning attacks to graph-based recommender systems

M Fang, G Yang, NZ Gong, J Liu - … of the 34th annual computer security …, 2018 - dl.acm.org
Recommender system is an important component of many web services to help users locate
items that match their interests. Several studies showed that recommender systems are …