no code implementations • 14 Sep 2022 • Rongmei Lin, Yonghui Xiao, Tien-Ju Yang, Ding Zhao, Li Xiong, Giovanni Motta, Françoise Beaufays
Automatic Speech Recognition models require large amount of speech data for training, and the collection of such data often leads to privacy concerns.
Automatic Speech Recognition Automatic Speech Recognition (ASR) +2
no code implementations • 6 May 2022 • Tien-Ju Yang, Yonghui Xiao, Giovanni Motta, Françoise Beaufays, Rajiv Mathews, Mingqing Chen
This paper addresses the challenges of training large neural network models under federated learning settings: high on-device memory usage and communication cost.
no code implementations • 7 Oct 2021 • Dhruv Guliani, Lillian Zhou, Changwan Ryu, Tien-Ju Yang, Harry Zhang, Yonghui Xiao, Francoise Beaufays, Giovanni Motta
Federated learning can be used to train machine learning models on the edge on local data that never leave devices, providing privacy by default.
Automatic Speech Recognition Automatic Speech Recognition (ASR) +2
3 code implementations • 4 May 2020 • Yang Cao, Yonghui Xiao, Shun Takagi, Li Xiong, Masatoshi Yoshikawa, Yilin Shen, Jinfei Liu, Hongxia Jin, Xiaofeng Xu
Third, we design a private location trace release framework that pipelines the detection of location exposure, policy graph repair, and private trajectory release with customizable and rigorous location privacy.
Cryptography and Security Computers and Society
3 code implementations • 1 May 2020 • Yang Cao, Shun Takagi, Yonghui Xiao, Li Xiong, Masatoshi Yoshikawa
Our system has three primary functions for epidemic surveillance: location monitoring, epidemic analysis, and contact tracing.
Databases Cryptography and Security
2 code implementations • 29 Nov 2017 • Yang Cao, Masatoshi Yoshikawa, Yonghui Xiao, Li Xiong
Our analysis reveals that, the event-level privacy loss of a DP mechanism may \textit{increase over time}.
Databases
2 code implementations • 24 Oct 2016 • Yang Cao, Masatoshi Yoshikawa, Yonghui Xiao, Li Xiong
Our analysis reveals that the privacy leakage of a DP mechanism may accumulate and increase over time.
Databases Cryptography and Security