#differential-privacy

[ follow ]
#natural-language-processing
fromHackernoon
1 year ago
Privacy technologies

Datasets for Evaluating Text Sanitization Techniques | HackerNoon

The article highlights the importance of effective text anonymization and privacy risk assessment methods in natural language processing.
fromHackernoon
1 year ago
Privacy technologies

LLM Probabilities, Training Size, and Perturbation Thresholds in Entity Recognition | HackerNoon

The article explores the intersection of natural language processing and privacy, emphasizing Differential Privacy as a method to protect data.
The research identifies key indicators for evaluating privacy risks in NLP applications.
fromHackernoon
1 year ago
Privacy technologies

Performance Analysis of the Privacy-Centric NER Model | HackerNoon

A privacy-oriented entity recognizer enhances the safety of sensitive data in NLP applications, balancing privacy preservation with data utility.
fromHackernoon
1 year ago
Privacy technologies

How Privacy Risk Indicators Impact Text Sanitization | HackerNoon

The study establishes effective indicators for assessing privacy risks in natural language processing.
fromHackernoon
1 year ago
Privacy technologies

Datasets for Evaluating Text Sanitization Techniques | HackerNoon

The article highlights the importance of effective text anonymization and privacy risk assessment methods in natural language processing.
fromHackernoon
1 year ago
Privacy technologies

LLM Probabilities, Training Size, and Perturbation Thresholds in Entity Recognition | HackerNoon

The article explores the intersection of natural language processing and privacy, emphasizing Differential Privacy as a method to protect data.
The research identifies key indicators for evaluating privacy risks in NLP applications.
fromHackernoon
1 year ago
Privacy technologies

Performance Analysis of the Privacy-Centric NER Model | HackerNoon

A privacy-oriented entity recognizer enhances the safety of sensitive data in NLP applications, balancing privacy preservation with data utility.
fromHackernoon
1 year ago
Privacy technologies

How Privacy Risk Indicators Impact Text Sanitization | HackerNoon

The study establishes effective indicators for assessing privacy risks in natural language processing.
more#natural-language-processing
#data-privacy
fromCornell Chronicle
1 week ago
Privacy professionals

Visiting lecturer to explore data privacy protection | Cornell Chronicle

Cynthia Dwork, a data privacy pioneer, will deliver impactful lectures at Cornell on differential privacy and its implications for society.
fromCornell Chronicle
1 week ago
Privacy professionals

Visiting lecturer to explore data privacy protection | Cornell Chronicle

Cynthia Dwork, a data privacy pioneer, will deliver impactful lectures at Cornell on differential privacy and its implications for society.
more#data-privacy
#supervised-learning
fromHackernoon
1 month ago
Data science

How to Test for AI Fairness | HackerNoon

The research focuses on developing fair supervised learning models using different datasets to evaluate performance towards fairness in predictions.
fromHackernoon
1 month ago
Data science

Mathematical Proofs for Fair AI Bias Analysis | HackerNoon

The article discusses enhancing fairness in supervised learning through distributionally robust optimization techniques.
fromHackernoon
1 month ago
Data science

How to Test for AI Fairness | HackerNoon

The research focuses on developing fair supervised learning models using different datasets to evaluate performance towards fairness in predictions.
fromHackernoon
1 month ago
Data science

Mathematical Proofs for Fair AI Bias Analysis | HackerNoon

The article discusses enhancing fairness in supervised learning through distributionally robust optimization techniques.
more#supervised-learning
Privacy professionals
fromHackernoon
9 months ago

Privacy in Cloud Computing through Immersion-based Coding: Abstract and Introduction | HackerNoon

A new framework allows cloud data processing while preserving user privacy through distortion and differential privacy techniques.
[ Load more ]