-
The following book is a good reference:
- [The Algorithmic Foundations for Differential Privacy](https://www.cis.upenn.edu/~aaroth/privacybook.html).
And one of the authors has a course for it …
dbosk updated
5 years ago
-
~~Exploring master thesis topic!~~ With **Honors** bsc, also msc **With Honors** potential! Only thesis grade needs to be high. _Zero_ courses to be done. 12 months of msc dedicated focus. [Honor thes…
-
Branching from the permission model discussion https://github.com/w3c/machine-learning-workshop/issues/72, I feel we should also discuss what are the considerations in design privacy-preserving ML API…
-
Hello,
I am an undergraduate student who are working on privacy-preserving machine learning for my graduation thesis. By testing the code downloaded from the repo, I found that the getAccuracy() in N…
-
-
Hi,
Thanks to the many constructive feedbacks on the SPARROW proposal, we are happy to propose a new version for the reporting capabilities. We believe that this proposal improves on securing users…
-
### 🚀 The feature, motivation and pitch
Hello 👋
It seems that `roll` only takes integers or tuples and applies the same roll in each element of the tensor. Is it possible to extend `roll` to take …
-
# Privacy preserving tech: the tools for safe open data use
***By Emma Bluemke, University of Oxford***
- Theme: Open Data 2.0
- Format: Lightning talk
## Abstract
In medical imaging, necessary priv…
-
### Idea Contribution
- [X] I have read all the feature request issues.
- [X] I'm interested in working on this issue
- [X] I'm part of GSSOC organization
### Explain feature request
Adding proper …
-
Hi,
I see you have a detailed tutorial on running your method on all tabular data. But may I know how to run dp-gan and dp-cgan on tabular data mentioned in your paper? Thank you!