Accepted articles here
Volume 19 Issue 2 Volume 19 Issue 1
Volume 18 Issue 3 Volume 18 Issue 2 Volume 18 Issue 1
Volume 17 Issue 3 Volume 17 Issue 2 Volume 17 Issue 1
Volume 16 Issue 3 Volume 16 Issue 2 Volume 16 Issue 1
Volume 15 Issue 3 Volume 15 Issue 2 Volume 15 Issue 1
Volume 14 Issue 3 Volume 14 Issue 2 Volume 14 Issue 1
Volume 13 Issue 3 Volume 13 Issue 2 Volume 13 Issue 1
Volume 12 Issue 3 Volume 12 Issue 2 Volume 12 Issue 1
Volume 11 Issue 3 Volume 11 Issue 2 Volume 11 Issue 1
Volume 10 Issue 3 Volume 10 Issue 2 Volume 10 Issue 1
Volume 9 Issue 3 Volume 9 Issue 2 Volume 9 Issue 1
Volume 8 Issue 3 Volume 8 Issue 2 Volume 8 Issue 1
Volume 7 Issue 3 Volume 7 Issue 2 Volume 7 Issue 1
Volume 6 Issue 3 Volume 6 Issue 2 Volume 6 Issue 1
Volume 5 Issue 3 Volume 5 Issue 2 Volume 5 Issue 1
Volume 4 Issue 3 Volume 4 Issue 2 Volume 4 Issue 1
Volume 3 Issue 3 Volume 3 Issue 2 Volume 3 Issue 1
Volume 2 Issue 3 Volume 2 Issue 2 Volume 2 Issue 1
Volume 1 Issue 3 Volume 1 Issue 2 Volume 1 Issue 1
An Adaptive Technique for Neural Network Training with Private Features and Public Labels
Islam A. Monir, Muhamad I. Fauzan, Gabriel Ghinita, Mohamed M. Abdallah
Transactions on Data Privacy 19:1 (2026) 1 - 28
Abstract, PDF
A Hierarchical Approach for Assessing the Vulnerability of Tree-Based Classification Models to Membership Inference Attack
Richard J. Preen, Jim Smith
Transactions on Data Privacy 19:1 (2026) 29 - 55