Literature Database

Automated discovery of trade-off between utility, privacy and fairness in machine learning models

Authors: Bogdan Ficiu, Neil D. Lawrence, Andrei Paleyes | Published: 2023-11-27
Trade-off Analysis
Privacy Protection Method
Evaluation Method

Secure and Verifiable Data Collaboration with Low-Cost Zero-Knowledge Proofs

Authors: Yizheng Zhu, Yuncheng Wu, Zhaojing Luo, Beng Chin Ooi, Xiaokui Xiao | Published: 2023-11-26
Privacy Protection
Multi-Party Computation
Cryptography

Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles

Authors: Sonali Singh, Faranak Abri, Akbar Siami Namin | Published: 2023-11-24
Abuse of AI Chatbots
Prompt Injection
Psychological Manipulation

Continuous Authentication Using Mouse Clickstream Data Analysis

Authors: Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy | Published: 2023-11-23
Model Performance Evaluation
User Authentication System
Watermark Evaluation

Privacy-Preserving Algorithmic Recourse

Authors: Sikha Pentyala, Shubham Sharma, Sanjay Kariyappa, Freddy Lecue, Daniele Magazzeni | Published: 2023-11-23
Privacy Protection
Machine Learning Method
Explainability

A Blockchain Solution for Collaborative Machine Learning over IoT

Authors: Carlos Beis-Penedo, Francisco Troncoso-Pastoriza, Rebeca P. Díaz-Redondo, Ana Fernández-Vilas, Manuel Fernández-Veiga, Martín González Soto | Published: 2023-11-23
Security Analysis
Privacy Protection
Machine Learning Method

DPSUR: Accelerating Differentially Private Stochastic Gradient Descent Using Selective Update and Release

Authors: Jie Fu, Qingqing Ye, Haibo Hu, Zhili Chen, Lulu Wang, Kuncan Wang, Xun Ran | Published: 2023-11-23 | Updated: 2023-11-29
Privacy Protection
Optimization Methods
Evaluation Method

PrivateLoRA For Efficient Privacy Preserving LLM

Authors: Yiming Wang, Yu Lin, Xiaodong Zeng, Guannan Zhang | Published: 2023-11-23
Training Protocol
Privacy Protection
Membership Inference

Enhancing Intrusion Detection In Internet Of Vehicles Through Federated Learning

Authors: Abhishek Sebastian, Pragna R, Sudhakaran G, Renjith P N, Leela Karthikeyan H | Published: 2023-11-23
Data Preprocessing
Privacy Protection
Intrusion Detection System

Acoustic Cybersecurity: Exploiting Voice-Activated Systems

Authors: Forrest McKee, David Noever | Published: 2023-11-23
Watermarking
Cybersecurity
Speech Synthesis Technology