Privacy Violation

ReCIT: Reconstructing Full Private Data from Gradient in Parameter-Efficient Fine-Tuning of Large Language Models

Authors: Jin Xie, Ruishi He, Songze Li, Xiaojun Jia, Shouling Ji | Published: 2025-04-29
Backdoor Detection
Privacy Violation
Attack Method

DP-2Stage: Adapting Language Models as Differentially Private Tabular Data Generators

Authors: Tejumade Afonja, Hui-Po Wang, Raouf Kerkouche, Mario Fritz | Published: 2024-12-03 | Updated: 2025-04-29
Privacy Violation
Synthetic Data Generation
Differential Privacy

ProPILE: Probing Privacy Leakage in Large Language Models

Authors: Siwon Kim, Sangdoo Yun, Hwaran Lee, Martin Gubri, Sungroh Yoon, Seong Joon Oh | Published: 2023-07-04
Data Leakage
Privacy Violation
Prompting Strategy

Evaluating Privacy Leakage in Split Learning

Authors: Xinchi Qiu, Ilias Leontiadis, Luca Melis, Alex Sablayrolles, Pierre Stock | Published: 2023-05-22 | Updated: 2024-01-19
Privacy Violation
Privacy Protection Method
Attack Method

Quantifying Association Capabilities of Large Language Models and Its Implications on Privacy Leakage

Authors: Hanyin Shao, Jie Huang, Shen Zheng, Kevin Chen-Chuan Chang | Published: 2023-05-22 | Updated: 2024-02-09
LLM Performance Evaluation
Privacy Violation
Privacy Protection Method

The privacy issue of counterfactual explanations: explanation linkage attacks

Authors: Sofie Goethals, Kenneth Sörensen, David Martens | Published: 2022-10-21
Counterfactual Explanation
Privacy Violation
Evaluation Method

COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies

Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso | Published: 2022-08-25 | Updated: 2023-11-27
Cybersecurity
Privacy Violation
User Activity Analysis

Joint Privacy Enhancement and Quantization in Federated Learning

Authors: Natalie Lang, Elad Sofer, Tomer Shaked, Nir Shlezinger | Published: 2022-08-23
Privacy Violation
Efficiency of Distributed Learning
Communication Efficiency

Decentralized Collaborative Learning with Probabilistic Data Protection

Authors: Tsuyoshi Idé, Rudy Raymond | Published: 2022-08-23 | Updated: 2022-08-24
Privacy Violation
Efficiency of Distributed Learning
Convergence Guarantee

A Review of Federated Learning in Energy Systems

Authors: Xu Cheng, Chendan Li, Xiufeng Liu | Published: 2022-08-20
Privacy Violation
Efficiency of Distributed Learning
Machine Learning