Privacy Protection Method

EmojiPrompt: Generative Prompt Obfuscation for Privacy-Preserving Communication with Cloud-based LLMs

Authors: Sam Lin, Wenyue Hua, Zhenting Wang, Mingyu Jin, Lizhou Fan, Yongfeng Zhang | Published: 2024-02-08 | Updated: 2025-03-20
Watermarking
Privacy Protection Method
Prompt Injection

A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective

Authors: Lei Yu, Meng Han, Yiming Li, Changting Lin, Yao Zhang, Mingyang Zhang, Yan Liu, Haiqin Weng, Yuseok Jeon, Ka-Ho Chow, Stacy Patterson | Published: 2024-02-06
Privacy Protection Method
Label Inference Attack
Defense Method

Machine Unlearning in Large Language Models

Authors: Kongyang Chen, Zixin Wang, Bing Mi, Waixi Liu, Shaowei Wang, Xiaojun Ren, Jiaxing Shen | Published: 2024-02-03
Privacy Protection Method
Model Performance Evaluation
Compliance with Ethical Guidelines

Integrating Differential Privacy and Contextual Integrity

Authors: Sebastian Benthall, Rachel Cummings | Published: 2024-01-28
Integration of CI and DP
Privacy Protection
Privacy Protection Method

Training Differentially Private Ad Prediction Models with Semi-Sensitive Features

Authors: Lynn Chua, Qiliang Cui, Badih Ghazi, Charlie Harrison, Pritish Kamath, Walid Krichene, Ravi Kumar, Pasin Manurangsi, Krishna Giri Narra, Amer Sinha, Avinash Varadarajan, Chiyuan Zhang | Published: 2024-01-26
Algorithm
Watermarking
Privacy Protection Method

GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption

Authors: Eugene Frimpong, Khoa Nguyen, Mindaugas Budzys, Tanveer Khan, Antonis Michalas | Published: 2024-01-26
Watermarking
Privacy Protection
Privacy Protection Method

Decentralized Federated Learning: A Survey on Security and Privacy

Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif, Boyu Wang, Qiang Yang | Published: 2024-01-25
Attack Methods against DFL
Backdoor Attack
Privacy Protection Method

Wasserstein Differential Privacy

Authors: Chengyi Yang, Jiayin Qi, Aimin Zhou | Published: 2024-01-23
Watermarking
Privacy Protection Method
Watermark Evaluation

Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey and the Open Libraries Behind Them

Authors: Chao Liu, Boxi Chen, Wei Shao, Chris Zhang, Kelvin Wong, Yi Zhang | Published: 2024-01-22 | Updated: 2024-01-27
Backdoor Attack
Privacy Protection Method
Membership Inference

Differentially Private Sliced Inverse Regression: Minimax Optimality and Algorithm

Authors: Xintao Xia, Linjun Zhang, Zhanrui Cai | Published: 2024-01-16
Algorithm
Algorithm Design
Privacy Protection Method