Search Results for author: Zhicong Huang

Found 5 papers, 3 papers with code

Improving Utility and Security of the Shuffler-based Differential Privacy

1 code implementation30 Aug 2019 Tianhao Wang, Bolin Ding, Min Xu, Zhicong Huang, Cheng Hong, Jingren Zhou, Ninghui Li, Somesh Jha

When collecting information, local differential privacy (LDP) alleviates privacy concerns of users because their private information is randomized before being sent it to the central aggregator.

Quantification of the Leakage in Federated Learning

no code implementations12 Oct 2019 Zhaorui Li, Zhicong Huang, Chaochao Chen, Cheng Hong

In this paper, we discuss the leakage based on a federated approximated logistic regression model and show that such gradient's leakage could leak the complete training data if all elements of the inputs are either 0 or 1.

Cryptography and Security

Privacy-preserving collaborative machine learning on genomic data using TensorFlow

1 code implementation11 Feb 2020 Cheng Hong, Zhicong Huang, Wen-jie Lu, Hunter Qu, Li Ma, Morten Dahl, Jason Mancuso

Machine learning (ML) methods have been widely used in genomic studies.

Cryptography and Security

PSA-Det3D: Pillar Set Abstraction for 3D object Detection

no code implementations20 Oct 2022 Zhicong Huang, Jingwen Zhao, Zhijie Zheng, Dihu Chena, Haifeng Hu

In this paper, we propose a pillar set abstraction (PSA) and foreground point compensation (FPC) and design a point-based detection network, PSA-Det3D, to improve the detection performance for small object.

3D Object Detection Object +3

Cannot find the paper you are looking for? You can Submit a new open access paper.