ReCIT: Reconstructing Full Private Data from Gradient in Parameter-Efficient Fine-Tuning of Large Language Models Authors: Jin Xie, Ruishi He, Songze Li, Xiaojun Jia, Shouling Ji | Published: 2025-04-29 Backdoor DetectionPrivacy ViolationAttack Method 2025.04.29 2025.05.27 Literature Database
DP-2Stage: Adapting Language Models as Differentially Private Tabular Data Generators Authors: Tejumade Afonja, Hui-Po Wang, Raouf Kerkouche, Mario Fritz | Published: 2024-12-03 | Updated: 2025-04-29 Privacy ViolationSynthetic Data GenerationDifferential Privacy 2024.12.03 2025.05.27 Literature Database
ProPILE: Probing Privacy Leakage in Large Language Models Authors: Siwon Kim, Sangdoo Yun, Hwaran Lee, Martin Gubri, Sungroh Yoon, Seong Joon Oh | Published: 2023-07-04 Data LeakagePrivacy ViolationPrompting Strategy 2023.07.04 2025.05.28 Literature Database
Evaluating Privacy Leakage in Split Learning Authors: Xinchi Qiu, Ilias Leontiadis, Luca Melis, Alex Sablayrolles, Pierre Stock | Published: 2023-05-22 | Updated: 2024-01-19 Privacy ViolationPrivacy Protection MethodAttack Method 2023.05.22 2025.05.28 Literature Database
Quantifying Association Capabilities of Large Language Models and Its Implications on Privacy Leakage Authors: Hanyin Shao, Jie Huang, Shen Zheng, Kevin Chen-Chuan Chang | Published: 2023-05-22 | Updated: 2024-02-09 LLM Performance EvaluationPrivacy ViolationPrivacy Protection Method 2023.05.22 2025.05.28 Literature Database
The privacy issue of counterfactual explanations: explanation linkage attacks Authors: Sofie Goethals, Kenneth Sörensen, David Martens | Published: 2022-10-21 Counterfactual ExplanationPrivacy ViolationEvaluation Method 2022.10.21 2025.05.28 Literature Database
COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso | Published: 2022-08-25 | Updated: 2023-11-27 CybersecurityPrivacy ViolationUser Activity Analysis 2022.08.25 2025.05.28 Literature Database
Joint Privacy Enhancement and Quantization in Federated Learning Authors: Natalie Lang, Elad Sofer, Tomer Shaked, Nir Shlezinger | Published: 2022-08-23 Privacy ViolationEfficiency of Distributed LearningCommunication Efficiency 2022.08.23 2025.05.28 Literature Database
Decentralized Collaborative Learning with Probabilistic Data Protection Authors: Tsuyoshi Idé, Rudy Raymond | Published: 2022-08-23 | Updated: 2022-08-24 Privacy ViolationEfficiency of Distributed LearningConvergence Guarantee 2022.08.23 2025.05.28 Literature Database
A Review of Federated Learning in Energy Systems Authors: Xu Cheng, Chendan Li, Xiufeng Liu | Published: 2022-08-20 Privacy ViolationEfficiency of Distributed LearningMachine Learning 2022.08.20 2025.05.28 Literature Database