Local differential privacy and its applications: A comprehensive survey

M Yang, T Guo, T Zhu, I Tjuawinata, J Zhao… - Computer Standards & …, 2023 - Elsevier
With the rapid development of low-cost consumer electronics and pervasive adoption of next
generation wireless communication technologies, a tremendous amount of data has been …

Graph unlearning

M Chen, Z Zhang, T Wang, M Backes… - Proceedings of the …, 2022 - dl.acm.org
Machine unlearning is a process of removing the impact of some training data from the
machine learning (ML) models upon receiving removal requests. While straightforward and …

LDP-IDS: Local differential privacy for infinite data streams

X Ren, L Shi, W Yu, S Yang, C Zhao, Z Xu - Proceedings of the 2022 …, 2022 - dl.acm.org
Local differential privacy (LDP) is promising for private streaming data collection and
analysis. However, existing few LDP studies over streams either apply to finite streams only …

{PrivTrace}: Differentially Private Trajectory Synthesis by Adaptive Markov Models

H Wang, Z Zhang, T Wang, S He, M Backes… - 32nd USENIX Security …, 2023 - usenix.org
Publishing trajectory data (individual's movement information) is very useful, but it also
raises privacy concerns. To handle the privacy concern, in this paper, we apply differential …

Constant matters: Fine-grained error bound on differentially private continual observation

H Fichtenberger, M Henzinger… - … on Machine Learning, 2023 - proceedings.mlr.press
We study fine-grained error bounds for differentially private algorithms for counting under
continual observation. Our main insight is that the matrix mechanism when using lower …

Ldptrace: Locally differentially private trajectory synthesis

Y Du, Y Hu, Z Zhang, Z Fang, L Chen… - Proceedings of the …, 2023 - dl.acm.org
Trajectory data has the potential to greatly benefit a wide-range of real-world applications,
such as tracking the spread of the disease through people's movement patterns and …

DDRM: A continual frequency estimation mechanism with local differential privacy

Q Xue, Q Ye, H Hu, Y Zhu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Many applications rely on continual data collection to provide real-time information services,
eg, real-time road traffic forecasts. However, the collection of original data brings risks to …

{FACE-AUDITOR}: Data Auditing in Facial Recognition Systems

M Chen, Z Zhang, T Wang, M Backes… - 32nd USENIX Security …, 2023 - usenix.org
Few-shot-based facial recognition systems have gained increasing attention due to their
scalability and ability to work with a few face images during the model deployment phase …

Continual observation under user-level differential privacy

W Dong, Q Luo, K Yi - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
In the foundational work of Dwork et al.[15] on continual observation under differential
privacy (DP), two privacy models have been proposed: event-level DP and user-level DP …

Constant matters: Fine-grained complexity of differentially private continual observation using completely bounded norms

M Henzinger, J Upadhyay - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We study fine-grained error bounds for differentially private algorithms for averaging and
counting in the continual observation model. For this, we use the completely bounded …