Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ก๏ธ Privacy Engineering
Data Minimization, Privacy by Design, Differential Privacy, GDPR
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
200672
posts in
34.5
ms
Privacy by Design
ย
๐
Digital Privacy
ministryoftesting.com
ยท
2d
Quadratic Objective
Perturbation
:
Curvature-Based
Differential Privacy
ย
๐
Privacy-Preserving Analytics
arxiv.org
ยท
6d
Efficient and Privacy-preserving
Outsourced
Training of Decision Tree Models Based on (
Leveled
) Fully Homomorphic Encryption
ย
๐
Privacy Preserving
eprint.iacr.org
ยท
2d
S2E17
- Noise in the Machine: How to Assess, Design & Deploy 'Differential Privacy' with Damien
Desfontaines
(Tumult Labs) - The Shifting Privacy Left Podcast
ย
๐
Privacy Preserving
shiftingprivacyleft.buzzsprout.com
ยท
5d
GPC
could cut EU consent
banners
- but law must catch up first
ย
๐
First-Party Data
ppc.land
ยท
4d
Privacy-preserving
collective reinforcement learning using fully
homomorphic
encryption in usage-based insurance
ย
๐
Privacy Preserving
sciencedirect.com
ยท
4d
opendp/opendp
: The core library of
differential
privacy algorithms powering the
OpenDP
Project.
ย
๐
Privacy Preserving
github.com
ยท
5d
Limits of
Personalizing
Differential Privacy
Budgets
ย
๐
Privacy-Preserving Analytics
arxiv.org
ยท
23h
Deep Learning under
Fractional-Order
Differential
Privacy
ย
๐
Privacy Preserving
arxiv.org
ยท
2d
SoK: Private LLM Inference using
Approximate
Homomorphic
Encryption
ย
๐ป
Local LLMs
eprint.iacr.org
ยท
3d
Convex
Optimization with Local Label Differential Privacy: Tight Bounds in All Privacy
Regimes
ย
๐
Privacy Preserving
arxiv.org
ยท
2d
On
Succinct
Non-Interactive Secure
Computation
with Malicious Security
ย
๐
Stream Ciphers
eprint.iacr.org
ยท
6d
How Does
Differential
Privacy Affect Social Bias in LLMs? A
Systematic
Evaluation
ย
๐ป
Local LLMs
arxiv.org
ยท
1d
Zero-Knowledge
Proofs
for Gradient
Boosted
Decision Trees
ย
๐ก๏ธ
Archive Verification
eprint.iacr.org
ยท
6d
Obscura: Privacy-Preserving Protocol for the
Algorand
Blockchain Using
LSAG
Ring Signatures
ย
๐
Decentralized Identity
eprint.iacr.org
ยท
5d
Maintaining
Sublinear
Locality Over Time:
Adaptively
Secure MPC on a Reusable Hidden Graph
ย
๐ป
Local LLMs
eprint.iacr.org
ยท
6d
Privacy Without Losing Place: A
Paradigm
for Private Retrieval in Spatial
RAGs
ย
๐
Archive Topology
arxiv.org
ยท
6d
Differentially
Private
Auditing
Under Strategic Response
ย
๐
Privacy-Preserving Analytics
arxiv.org
ยท
3d
INO-SGD
: Addressing Utility Imbalance under
Individualized
Differential Privacy
ย
๐
Privacy Preserving
arxiv.org
ยท
3d
Differential Privacy in the
Extensive-Form
Bandit
Problem
ย
๐
Privacy Preserving
arxiv.org
ยท
6d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help