SODA: Protecting Proprietary Information in On-Device Machine Learning Models Authors: Akanksha Atrey, Ritwik Sinha, Saayan Mitra, Prashant Shenoy | Published: 2023-12-22 WatermarkingPrivacy Protection MethodMembership Inference 2023.12.22 2025.05.27 Literature Database
Robustness, Efficiency, or Privacy: Pick Two in Machine Learning Authors: Youssef Allouah, Rachid Guerraoui, John Stephan | Published: 2023-12-22 | Updated: 2024-03-11 Byzantine ResiliencePrivacy Protection MethodRobustness Evaluation 2023.12.22 2025.05.27 Literature Database
Rényi Pufferfish Privacy: General Additive Noise Mechanisms and Privacy Amplification by Iteration Authors: Clément Pierquin, Aurélien Bellet, Marc Tommasi, Matthieu Boussard | Published: 2023-12-21 | Updated: 2024-06-10 WatermarkingPrivacy Protection MethodWatermark Evaluation 2023.12.21 2025.05.27 Literature Database
Harnessing Inherent Noises for Privacy Preservation in Quantum Machine Learning Authors: Keyi Ju, Xiaoqi Qin, Hui Zhong, Xinyue Zhang, Miao Pan, Baoling Liu | Published: 2023-12-18 | Updated: 2024-03-07 Privacy ProtectionPrivacy Protection MethodQuantum Machine Learning 2023.12.18 2025.05.27 Literature Database
Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models Authors: Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Yuang Qi, Weiming Zhang, Nenghai Yu | Published: 2023-12-15 | Updated: 2024-10-10 Privacy Protection MethodPrompt InjectionWatermark Evaluation 2023.12.15 2025.05.27 Literature Database
Guardians of Trust: Navigating Data Security in AIOps through Vendor Partnerships Authors: Subhadip Kumar | Published: 2023-12-10 | Updated: 2024-01-16 Security AnalysisData Protection MethodPrivacy Protection Method 2023.12.10 2025.05.28 Literature Database
Beyond Gradient and Priors in Privacy Attacks: Leveraging Pooler Layer Inputs of Language Models in Federated Learning Authors: Jianwei Li, Sheng Liu, Qi Lei | Published: 2023-12-10 | Updated: 2024-03-15 WatermarkingPrivacy Protection MethodFederated Learning 2023.12.10 2025.05.28 Literature Database
When PETs misbehave: A Contextual Integrity analysis Authors: Ero Balsa, Yan Shvartzshnaider | Published: 2023-12-05 WatermarkingPrivacy ProtectionPrivacy Protection Method 2023.12.05 2025.05.28 Literature Database
Hot PATE: Private Aggregation of Distributions for Diverse Task Authors: Edith Cohen, Benjamin Cohen-Wang, Xin Lyu, Jelani Nelson, Tamas Sarlos, Uri Stemmer | Published: 2023-12-04 | Updated: 2024-05-17 WatermarkingPrivacy Protection MethodComputational Efficiency 2023.12.04 2025.05.28 Literature Database
Exploring the Robustness of Decentralized Training for Large Language Models Authors: Lin Lu, Chenxi Dai, Wangcheng Tao, Binhang Yuan, Yanan Sun, Pan Zhou | Published: 2023-12-01 Privacy Protection MethodPoisoningPoisoning Attack 2023.12.01 2025.05.28 Literature Database