Alert button
Picture for Ninghui Li

Ninghui Li

Alert button

Towards Principled Assessment of Tabular Data Synthesis Algorithms

Add code
Bookmark button
Alert button
Feb 09, 2024
Yuntao Du, Ninghui Li

Viaarxiv icon

MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training

Add code
Bookmark button
Alert button
Nov 02, 2023
Jiacheng Li, Ninghui Li, Bruno Ribeiro

Viaarxiv icon

Differentially Private Vertical Federated Clustering

Add code
Bookmark button
Alert button
Aug 02, 2022
Zitao Li, Tianhao Wang, Ninghui Li

Figure 1 for Differentially Private Vertical Federated Clustering
Figure 2 for Differentially Private Vertical Federated Clustering
Figure 3 for Differentially Private Vertical Federated Clustering
Figure 4 for Differentially Private Vertical Federated Clustering
Viaarxiv icon

Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models

Add code
Bookmark button
Alert button
Jan 23, 2022
Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino

Figure 1 for Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
Figure 2 for Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
Figure 3 for Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
Figure 4 for Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
Viaarxiv icon

Black-box Model Inversion Attribute Inference Attacks on Classification Models

Add code
Bookmark button
Alert button
Dec 07, 2020
Shagufta Mehnaz, Ninghui Li, Elisa Bertino

Figure 1 for Black-box Model Inversion Attribute Inference Attacks on Classification Models
Figure 2 for Black-box Model Inversion Attribute Inference Attacks on Classification Models
Figure 3 for Black-box Model Inversion Attribute Inference Attacks on Classification Models
Figure 4 for Black-box Model Inversion Attribute Inference Attacks on Classification Models
Viaarxiv icon

Continuous Release of Data Streams under both Centralized and Local Differential Privacy

Add code
Bookmark button
Alert button
May 24, 2020
Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha

Figure 1 for Continuous Release of Data Streams under both Centralized and Local Differential Privacy
Figure 2 for Continuous Release of Data Streams under both Centralized and Local Differential Privacy
Figure 3 for Continuous Release of Data Streams under both Centralized and Local Differential Privacy
Figure 4 for Continuous Release of Data Streams under both Centralized and Local Differential Privacy
Viaarxiv icon

Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap

Add code
Bookmark button
Alert button
Feb 27, 2020
Jiacheng Li, Ninghui Li, Bruno Ribeiro

Figure 1 for Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap
Figure 2 for Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap
Figure 3 for Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap
Figure 4 for Membership Inference Attacks and Defenses in Supervised Learning via Generalization Gap
Viaarxiv icon

Estimating Numerical Distributions under Local Differential Privacy

Add code
Bookmark button
Alert button
Dec 02, 2019
Zitao Li, Tianhao Wang, Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li

Figure 1 for Estimating Numerical Distributions under Local Differential Privacy
Figure 2 for Estimating Numerical Distributions under Local Differential Privacy
Figure 3 for Estimating Numerical Distributions under Local Differential Privacy
Figure 4 for Estimating Numerical Distributions under Local Differential Privacy
Viaarxiv icon

Practical and Robust Privacy Amplification with Multi-Party Differential Privacy

Add code
Bookmark button
Alert button
Aug 30, 2019
Tianhao Wang, Min Xu, Bolin Ding, Jingren Zhou, Ninghui Li, Somesh Jha

Figure 1 for Practical and Robust Privacy Amplification with Multi-Party Differential Privacy
Figure 2 for Practical and Robust Privacy Amplification with Multi-Party Differential Privacy
Figure 3 for Practical and Robust Privacy Amplification with Multi-Party Differential Privacy
Figure 4 for Practical and Robust Privacy Amplification with Multi-Party Differential Privacy
Viaarxiv icon

Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples

Add code
Bookmark button
Alert button
Dec 05, 2018
Huangyi Ge, Sze Yiu Chau, Ninghui Li

Figure 1 for Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples
Figure 2 for Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples
Figure 3 for Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples
Figure 4 for Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples
Viaarxiv icon