no code implementations • 24 Jun 2024 • Tao Huang, Ziyang Chen, Jiayang Meng, Qingyu Huang, Xu Yang, Xun Yi, Ibrahim Khalil
This lightweight, scalable method significantly enhances model accuracy and strengthens resistance to membership inference attacks.
no code implementations • 13 Jun 2024 • Jiayang Meng, Tao Huang, Hong Chen, Cuiping Li
Gradient leakage has been identified as a potential source of privacy breaches in modern image processing systems, where the adversary can completely reconstruct the training images from leaked gradients.