Cited By
View all- Huang WZhang ZZhao WPeng JXu WLiao YZhou SWang Z(2025)Auditing privacy budget of differentially private neural network modelsNeurocomputing10.1016/j.neucom.2024.128756614(128756)Online publication date: Jan-2025
- Wang SXiang LCheng BJi ZSun TWang XLuo BLiao XXu JKirda ELie D(2024)Curator Attack: When Blackbox Differential Privacy Auditing Loses Its PowerProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690367(3540-3554)Online publication date: 2-Dec-2024
- Stevanoski BCretu Ade Montjoye YLuo BLiao XXu JKirda ELie D(2024)QueryCheetah: Fast Automated Discovery of Attribute Inference Attacks Against Query-Based SystemsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690272(3451-3465)Online publication date: 2-Dec-2024
- Show More Cited By