We explore how data modification can enhance privacy by examining the connection between data modification and machine learning. Specifically, machine learning “meets” data modification in two ways. First, data modification can protect the data that is used to train machine learning models focusing it on the intended use and inhibiting unwanted inference. Second, machine learning can provide new ways of creating modified data. In this chapter, we discuss data modification approaches, applied during data pre-processing, that are suited for online data sharing scenarios. Specifically, we define two scenarios “User data sharing” and “Data set sharing” and describe the threat models associated with each scenario and related privacy threats. We ...
As machine learning and artificial intelligence (ML/AI) are becoming more popular and advanced, ther...
As artificial intelligence becomes more and more prevalent, machine learning algorithms are being us...
Data holders are increasingly seeking to protect their user’s privacy, whilst still maximizing their...
In this thesis, we exploit the advantages of Machine learning (ML) in the domains of data security a...
The explosion of data collection and advances in artificial intelligence and machine learning have m...
Thesis (Ph.D.)--University of Washington, 2021Convolutional neural networks (CNNs) can be trained wi...
Machine learning (ML) has been employed in a wide variety of domains where micro-data (i.e., persona...
The right to be forgotten states that a data owner has the right to erase their data from an entity ...
It is observed in the literature that data augmentation can significantly mitigate membership infere...
The application of machine learning techniques to large and distributed data archives might result i...
There is a potential in the field of medicine and finance of doing collaborative machine learning. T...
Machine learning provides an effective approach to execute big data analysis. As a branch of machine...
This article reviews privacy challenges in machine learning and provides a critical overview of the ...
121 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2004.The study presents some effec...
Recent years have witnessed a rapid development in machine learning systems and a widespread increas...
As machine learning and artificial intelligence (ML/AI) are becoming more popular and advanced, ther...
As artificial intelligence becomes more and more prevalent, machine learning algorithms are being us...
Data holders are increasingly seeking to protect their user’s privacy, whilst still maximizing their...
In this thesis, we exploit the advantages of Machine learning (ML) in the domains of data security a...
The explosion of data collection and advances in artificial intelligence and machine learning have m...
Thesis (Ph.D.)--University of Washington, 2021Convolutional neural networks (CNNs) can be trained wi...
Machine learning (ML) has been employed in a wide variety of domains where micro-data (i.e., persona...
The right to be forgotten states that a data owner has the right to erase their data from an entity ...
It is observed in the literature that data augmentation can significantly mitigate membership infere...
The application of machine learning techniques to large and distributed data archives might result i...
There is a potential in the field of medicine and finance of doing collaborative machine learning. T...
Machine learning provides an effective approach to execute big data analysis. As a branch of machine...
This article reviews privacy challenges in machine learning and provides a critical overview of the ...
121 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2004.The study presents some effec...
Recent years have witnessed a rapid development in machine learning systems and a widespread increas...
As machine learning and artificial intelligence (ML/AI) are becoming more popular and advanced, ther...
As artificial intelligence becomes more and more prevalent, machine learning algorithms are being us...
Data holders are increasingly seeking to protect their user’s privacy, whilst still maximizing their...