Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models Authors: Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Yuang Qi, Weiming Zhang, Nenghai Yu | Published: 2023-12-15 | Updated: 2024-10-10 Privacy Protection MethodPrompt InjectionWatermark Evaluation 2023.12.15 2025.05.27 Literature Database
Guardians of Trust: Navigating Data Security in AIOps through Vendor Partnerships Authors: Subhadip Kumar | Published: 2023-12-10 | Updated: 2024-01-16 Security AnalysisData Protection MethodPrivacy Protection Method 2023.12.10 2025.05.28 Literature Database
Beyond Gradient and Priors in Privacy Attacks: Leveraging Pooler Layer Inputs of Language Models in Federated Learning Authors: Jianwei Li, Sheng Liu, Qi Lei | Published: 2023-12-10 | Updated: 2024-03-15 WatermarkingPrivacy Protection MethodFederated Learning 2023.12.10 2025.05.28 Literature Database
When PETs misbehave: A Contextual Integrity analysis Authors: Ero Balsa, Yan Shvartzshnaider | Published: 2023-12-05 WatermarkingPrivacy ProtectionPrivacy Protection Method 2023.12.05 2025.05.28 Literature Database
Hot PATE: Private Aggregation of Distributions for Diverse Task Authors: Edith Cohen, Benjamin Cohen-Wang, Xin Lyu, Jelani Nelson, Tamas Sarlos, Uri Stemmer | Published: 2023-12-04 | Updated: 2024-05-17 WatermarkingPrivacy Protection MethodComputational Efficiency 2023.12.04 2025.05.28 Literature Database
Exploring the Robustness of Decentralized Training for Large Language Models Authors: Lin Lu, Chenxi Dai, Wangcheng Tao, Binhang Yuan, Yanan Sun, Pan Zhou | Published: 2023-12-01 Privacy Protection MethodPoisoningPoisoning Attack 2023.12.01 2025.05.28 Literature Database
MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning Authors: Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty | Published: 2023-11-28 Privacy Protection MethodMembership InferenceFederated Learning 2023.11.28 2025.05.28 Literature Database
Automated discovery of trade-off between utility, privacy and fairness in machine learning models Authors: Bogdan Ficiu, Neil D. Lawrence, Andrei Paleyes | Published: 2023-11-27 Trade-off AnalysisPrivacy Protection MethodEvaluation Method 2023.11.27 2025.05.28 Literature Database
DEPN: Detecting and Editing Privacy Neurons in Pretrained Language Models Authors: Xinwei Wu, Junzhuo Li, Minghui Xu, Weilong Dong, Shuangzhi Wu, Chao Bian, Deyi Xiong | Published: 2023-10-31 | Updated: 2023-12-05 Privacy Protection MethodPrivacy TechniqueModel editing techniques 2023.10.31 2025.05.28 Literature Database
Blind quantum machine learning with quantum bipartite correlator Authors: Changhao Li, Boning Li, Omar Amer, Ruslan Shaydulin, Shouvanik Chakrabarti, Guoqing Wang, Haowei Xu, Hao Tang, Isidor Schoch, Niraj Kumar, Charles Lim, Ju Li, Paola Cappellaro, Marco Pistoia | Published: 2023-10-19 Privacy Protection MethodMalicious ClientQuantum Cryptography Technology 2023.10.19 2025.05.28 Literature Database