Data Protection Method

VeriLeaky: Navigating IP Protection vs Utility in Fine-Tuning for LLM-Driven Verilog Coding

Authors: Zeng Wang, Minghao Shao, Mohammed Nabeel, Prithwish Basu Roy, Likhitha Mankali, Jitendra Bhandari, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel | Published: 2025-03-17 | Updated: 2025-04-14
Data Protection Method
Privacy Protection Method
Prompt leaking

Research on Large Language Model Cross-Cloud Privacy Protection and Collaborative Training based on Federated Learning

Authors: Ze Yang, Yihong Jin, Yihan Zhang, Juntian Liu, Xinhe Xu | Published: 2025-03-15
Indirect Prompt Injection
Data Protection Method
Privacy Protection Method

Nonlinear Transformations Against Unlearnable Datasets

Authors: Thushari Hapuarachchi, Jing Lin, Kaiqi Xiong, Mohamed Rahouti, Gitte Ost | Published: 2024-06-05
Data Protection Method
Model Performance Evaluation
Adversarial Example

Robust Kernel Hypothesis Testing under Data Corruption

Authors: Antonin Schrab, Ilmun Kim | Published: 2024-05-30
Data Privacy Assessment
Data Protection Method
Hypothesis Testing

AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management

Authors: Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi | Published: 2024-04-18 | Updated: 2024-05-08
Data Protection Method
Resource optimization
Speech Synthesis Technology

Data-Oblivious ML Accelerators using Hardware Security Extensions

Authors: Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan | Published: 2024-01-29
FPGA
Watermarking
Data Protection Method

A Learning oriented DLP System based on Classification Model

Authors: Kishu Gupta, Ashwani Kush | Published: 2023-12-21
Data Protection Method
Data Preprocessing
Model Performance Evaluation

Guardians of Trust: Navigating Data Security in AIOps through Vendor Partnerships

Authors: Subhadip Kumar | Published: 2023-12-10 | Updated: 2024-01-16
Security Analysis
Data Protection Method
Privacy Protection Method

A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning

Authors: Padmaksha Roy, Jaganmohan Chandrasekaran, Erin Lanus, Laura Freeman, Jeremy Werner | Published: 2023-10-06 | Updated: 2023-12-04
Data Protection Method
Privacy Protection Method
Poisoning

Privacy-Preserving In-Context Learning with Differentially Private Few-Shot Generation

Authors: Xinyu Tang, Richard Shin, Huseyin A. Inan, Andre Manoel, Fatemehsadat Mireshghallah, Zinan Lin, Sivakanth Gopi, Janardhan Kulkarni, Robert Sim | Published: 2023-09-21 | Updated: 2024-01-28
Data Protection Method
Data Generation
Privacy Technique