no code implementations • 20 Feb 2024 • Alexander Ziller, Anneliese Riess, Kristian Schwethelm, Tamara T. Mueller, Daniel Rueckert, Georgios Kaissis
When training ML models with differential privacy (DP), formal upper bounds on the success of such reconstruction attacks can be provided.