Tuning without Peeking: Provable Privacy and Generalization Bounds for LLM Post-Training Authors: Ismail Labiad, Mathurin Videau, Matthieu Kowalski, Marc Schoenauer, Alessandro Leite, Julia Kempe, Olivier Teytaud | Published: 2025-07-02 RAGPrivacy AssuranceDifferential Privacy 2025.07.02 2025.07.04 Literature Database
A Privacy-Preserving Indoor Localization System based on Hierarchical Federated Learning Authors: Masood Jan, Wafa Njima, Xun Zhang | Published: 2025-07-02 Privacy AssuranceDistributed LearningPerformance Evaluation 2025.07.02 2025.07.04 Literature Database
Multi-Dimensional Randomized Response Authors: Josep Domingo-Ferrer, Jordi Soria-Comas | Published: 2020-10-21 | Updated: 2020-12-19 Dataset evaluationPrivacy AssuranceMultidimensional Data Analysis 2020.10.21 2025.05.28 Literature Database
Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack Authors: Bo Zhang, Ruotong Yu, Haipei Sun, Yanying Li, Jun Xu, Hui Wang | Published: 2020-01-24 Privacy AssurancePrivacy Enhancing TechnologyStatistical Methods 2020.01.24 2025.05.28 Literature Database
Federated Learning with Autotuned Communication-Efficient Secure Aggregation Authors: Keith Bonawitz, Fariborz Salehi, Jakub Konečný, Brendan McMahan, Marco Gruteser | Published: 2019-11-30 Secure Communication ChannelPrivacy AssuranceQuantum Classifier 2019.11.30 2025.05.28 Literature Database
Secure Federated Submodel Learning Authors: Chaoyue Niu, Fan Wu, Shaojie Tang, Lifeng Hua, Rongfei Jia, Chengfei Lv, Zhihua Wu, Guihai Chen | Published: 2019-11-06 | Updated: 2019-11-11 Client Selection MethodPrivacy AssurancePrivacy Management 2019.11.06 2025.05.28 Literature Database
Privacy for Free: Communication-Efficient Learning with Differential Privacy Using Sketches Authors: Tian Li, Zaoxing Liu, Vyas Sekar, Virginia Smith | Published: 2019-11-03 | Updated: 2019-12-06 Privacy AssurancePrivacy ManagementCommunication Efficiency 2019.11.03 2025.05.28 Literature Database
Auditing Data Provenance in Text-Generation Models Authors: Congzheng Song, Vitaly Shmatikov | Published: 2018-11-01 | Updated: 2019-05-17 Integration of Digital Signatures and Machine LearningPrivacy AssuranceMembership Inference 2018.11.01 2025.05.28 Literature Database
Conditionals in Homomorphic Encryption and Machine Learning Applications Authors: Diego Chialva, Ann Dooms | Published: 2018-10-29 | Updated: 2019-05-09 Privacy AssurancePerformance EvaluationCryptography 2018.10.29 2025.05.28 Literature Database