Privacy Protection Method

Prada: Black-Box LLM Adaptation with Private Data on Resource-Constrained Devices

Authors: Ziyao Wang, Yexiao He, Zheyu Shen, Yu Li, Guoheng Sun, Myungjin Lee, Ang Li | Published: 2025-03-19
Privacy Protection Method
Prompt leaking
Deep Learning

Zero-Knowledge Proof-Based Consensus for Blockchain-Secured Federated Learning

Authors: Tianxing Fu, Jia Hu, Geyong Min, Zi Wang | Published: 2025-03-17
Privacy Protection Method
Efficient Proof System
Deep Learning

VeriLeaky: Navigating IP Protection vs Utility in Fine-Tuning for LLM-Driven Verilog Coding

Authors: Zeng Wang, Minghao Shao, Mohammed Nabeel, Prithwish Basu Roy, Likhitha Mankali, Jitendra Bhandari, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel | Published: 2025-03-17 | Updated: 2025-04-14
Data Protection Method
Privacy Protection Method
Prompt leaking

Research on Large Language Model Cross-Cloud Privacy Protection and Collaborative Training based on Federated Learning

Authors: Ze Yang, Yihong Jin, Yihan Zhang, Juntian Liu, Xinhe Xu | Published: 2025-03-15
Indirect Prompt Injection
Data Protection Method
Privacy Protection Method

Split-n-Chain: Privacy-Preserving Multi-Node Split Learning with Blockchain-Based Auditability

Authors: Mukesh Sahani, Binanda Sengupta | Published: 2025-03-10 | Updated: 2025-04-15
Performance Evaluation
Privacy Protection Method
Distributed Learning

Secure On-Device Video OOD Detection Without Backpropagation

Authors: Shawn Li, Peilin Cai, Yuxiao Zhou, Zhiyu Ni, Renjie Liang, You Qin, Yi Nian, Zhengzhong Tu, Xiyang Hu, Yue Zhao | Published: 2025-03-08 | Updated: 2025-03-17
Privacy Protection Method
Framework
Deep Learning

Privacy-Preserving Dynamic Assortment Selection

Authors: Young Hyun Cho, Will Wei Sun | Published: 2024-10-29
Privacy Protection
Privacy Protection Method
Optimization Problem

Federated Learning in Practice: Reflections and Projections

Authors: Katharine Daly, Hubert Eichner, Peter Kairouz, H. Brendan McMahan, Daniel Ramage, Zheng Xu | Published: 2024-10-11
Privacy Protection
Privacy Protection Method
Poisoning

PILLAR: an AI-Powered Privacy Threat Modeling Tool

Authors: Majid Mollaeefar, Andrea Bissoli, Silvio Ranise | Published: 2024-10-11
Privacy Protection
Privacy Protection Method
Prompt Injection

Privately Learning from Graphs with Applications in Fine-tuning Large Language Models

Authors: Haoteng Yin, Rongzhe Wei, Eli Chien, Pan Li | Published: 2024-10-10
Privacy Protection
Privacy Protection Method