Privacy Protection Method

SODA: Protecting Proprietary Information in On-Device Machine Learning Models

Authors: Akanksha Atrey, Ritwik Sinha, Saayan Mitra, Prashant Shenoy | Published: 2023-12-22
Watermarking
Privacy Protection Method
Membership Inference

Robustness, Efficiency, or Privacy: Pick Two in Machine Learning

Authors: Youssef Allouah, Rachid Guerraoui, John Stephan | Published: 2023-12-22 | Updated: 2024-03-11
Byzantine Resilience
Privacy Protection Method
Robustness Evaluation

Rényi Pufferfish Privacy: General Additive Noise Mechanisms and Privacy Amplification by Iteration

Authors: Clément Pierquin, Aurélien Bellet, Marc Tommasi, Matthieu Boussard | Published: 2023-12-21 | Updated: 2024-06-10
Watermarking
Privacy Protection Method
Watermark Evaluation

Harnessing Inherent Noises for Privacy Preservation in Quantum Machine Learning

Authors: Keyi Ju, Xiaoqi Qin, Hui Zhong, Xinyue Zhang, Miao Pan, Baoling Liu | Published: 2023-12-18 | Updated: 2024-03-07
Privacy Protection
Privacy Protection Method
Quantum Machine Learning

Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models

Authors: Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Yuang Qi, Weiming Zhang, Nenghai Yu | Published: 2023-12-15 | Updated: 2024-10-10
Privacy Protection Method
Prompt Injection
Watermark Evaluation

Guardians of Trust: Navigating Data Security in AIOps through Vendor Partnerships

Authors: Subhadip Kumar | Published: 2023-12-10 | Updated: 2024-01-16
Security Analysis
Data Protection Method
Privacy Protection Method

Beyond Gradient and Priors in Privacy Attacks: Leveraging Pooler Layer Inputs of Language Models in Federated Learning

Authors: Jianwei Li, Sheng Liu, Qi Lei | Published: 2023-12-10 | Updated: 2024-03-15
Watermarking
Privacy Protection Method
Federated Learning

When PETs misbehave: A Contextual Integrity analysis

Authors: Ero Balsa, Yan Shvartzshnaider | Published: 2023-12-05
Watermarking
Privacy Protection
Privacy Protection Method

Hot PATE: Private Aggregation of Distributions for Diverse Task

Authors: Edith Cohen, Benjamin Cohen-Wang, Xin Lyu, Jelani Nelson, Tamas Sarlos, Uri Stemmer | Published: 2023-12-04 | Updated: 2024-05-17
Watermarking
Privacy Protection Method
Computational Efficiency

Exploring the Robustness of Decentralized Training for Large Language Models

Authors: Lin Lu, Chenxi Dai, Wangcheng Tao, Binhang Yuan, Yanan Sun, Pan Zhou | Published: 2023-12-01
Privacy Protection Method
Poisoning
Poisoning Attack