Biometric authentication service providers often claim that it is not
po...
One of the new developments in chit-chat bots is a long-term memory mech...
Named entity recognition models (NER), are widely used for identifying n...
Sensors embedded in mobile smart devices can monitor users' activity wit...
Differential privacy (DP) has been applied in deep learning for preservi...
We show that the `optimal' use of the parallel composition theorem
corre...
Lack of trust between organisations and privacy concerns about their dat...
With an increase in low-cost machine learning APIs, advanced machine lea...
Observation Resilient Authentication Schemes (ORAS) are a class of share...
We assess the security of machine learning based biometric authenticatio...
A number of recent works have demonstrated that API access to machine
le...
This paper focuses on reporting of Internet malicious activity (or
mal-a...
We describe and evaluate an attack that reconstructs the histogram of an...
We propose a generic mechanism to efficiently release differentially pri...
We present a differentially private mechanism to display statistics (e.g...
Differential Privacy is one of the strongest privacy guarantees, which a...