Prada: Black-Box LLM Adaptation with Private Data on Resource-Constrained Devices Authors: Ziyao Wang, Yexiao He, Zheyu Shen, Yu Li, Guoheng Sun, Myungjin Lee, Ang Li | Published: 2025-03-19 Privacy Protection MethodPrompt leakingDeep Learning 2025.03.19 2025.05.27 Literature Database
Zero-Knowledge Proof-Based Consensus for Blockchain-Secured Federated Learning Authors: Tianxing Fu, Jia Hu, Geyong Min, Zi Wang | Published: 2025-03-17 Privacy Protection MethodEfficient Proof SystemDeep Learning 2025.03.17 2025.05.27 Literature Database
VeriLeaky: Navigating IP Protection vs Utility in Fine-Tuning for LLM-Driven Verilog Coding Authors: Zeng Wang, Minghao Shao, Mohammed Nabeel, Prithwish Basu Roy, Likhitha Mankali, Jitendra Bhandari, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel | Published: 2025-03-17 | Updated: 2025-04-14 Data Protection MethodPrivacy Protection MethodPrompt leaking 2025.03.17 2025.05.27 Literature Database
Research on Large Language Model Cross-Cloud Privacy Protection and Collaborative Training based on Federated Learning Authors: Ze Yang, Yihong Jin, Yihan Zhang, Juntian Liu, Xinhe Xu | Published: 2025-03-15 Indirect Prompt InjectionData Protection MethodPrivacy Protection Method 2025.03.15 2025.05.27 Literature Database
Split-n-Chain: Privacy-Preserving Multi-Node Split Learning with Blockchain-Based Auditability Authors: Mukesh Sahani, Binanda Sengupta | Published: 2025-03-10 | Updated: 2025-04-15 Performance EvaluationPrivacy Protection MethodDistributed Learning 2025.03.10 2025.05.27 Literature Database
Secure On-Device Video OOD Detection Without Backpropagation Authors: Shawn Li, Peilin Cai, Yuxiao Zhou, Zhiyu Ni, Renjie Liang, You Qin, Yi Nian, Zhengzhong Tu, Xiyang Hu, Yue Zhao | Published: 2025-03-08 | Updated: 2025-03-17 Privacy Protection MethodFrameworkDeep Learning 2025.03.08 2025.05.27 Literature Database
Privacy-Preserving Dynamic Assortment Selection Authors: Young Hyun Cho, Will Wei Sun | Published: 2024-10-29 Privacy ProtectionPrivacy Protection MethodOptimization Problem 2024.10.29 2025.05.27 Literature Database
Federated Learning in Practice: Reflections and Projections Authors: Katharine Daly, Hubert Eichner, Peter Kairouz, H. Brendan McMahan, Daniel Ramage, Zheng Xu | Published: 2024-10-11 Privacy ProtectionPrivacy Protection MethodPoisoning 2024.10.11 2025.05.27 Literature Database
PILLAR: an AI-Powered Privacy Threat Modeling Tool Authors: Majid Mollaeefar, Andrea Bissoli, Silvio Ranise | Published: 2024-10-11 Privacy ProtectionPrivacy Protection MethodPrompt Injection 2024.10.11 2025.05.27 Literature Database
Privately Learning from Graphs with Applications in Fine-tuning Large Language Models Authors: Haoteng Yin, Rongzhe Wei, Eli Chien, Pan Li | Published: 2024-10-10 Privacy ProtectionPrivacy Protection Method 2024.10.10 2025.05.27 Literature Database