Quantifying Association Capabilities of Large Language Models and Its Implications on Privacy Leakage Authors: Hanyin Shao, Jie Huang, Shen Zheng, Kevin Chen-Chuan Chang | Published: 2023-05-22 | Updated: 2024-02-09 LLM Performance EvaluationPrivacy ViolationPrivacy Protection Method 2023.05.22 2025.05.28 Literature Database
In the Name of Fairness: Assessing the Bias in Clinical Record De-identification Authors: Yuxin Xiao, Shulammite Lim, Tom Joseph Pollard, Marzyeh Ghassemi | Published: 2023-05-18 | Updated: 2024-01-03 Privacy Protection MethodFairness evaluationThreats of Medical AI 2023.05.18 2025.05.28 Literature Database
Quadratic Functional Encryption for Secure Training in Vertical Federated Learning Authors: Shuangyi Chen, Anuja Modi, Shweta Agrawal, Ashish Khisti | Published: 2023-05-15 | Updated: 2023-06-19 DNN IP Protection MethodTraining ProtocolPrivacy Protection Method 2023.05.15 2025.05.28 Literature Database
Have it your way: Individualized Privacy Assignment for DP-SGD Authors: Franziska Boenisch, Christopher Mühl, Adam Dziedzic, Roy Rinberg, Nicolas Papernot | Published: 2023-03-29 | Updated: 2024-01-19 Customization MethodPrivacy Protection MethodPrivacy Assessment 2023.03.29 2025.05.28 Literature Database
On the Query Complexity of Training Data Reconstruction in Private Learning Authors: Prateeti Mukherjee, Satya Lokam | Published: 2023-03-29 | Updated: 2024-01-11 Privacy Protection MethodPrivacy AnalysisPrivacy Assessment 2023.03.29 2025.05.28 Literature Database
Dissecting Distribution Inference Authors: Anshuman Suri, Yifu Lu, Yanjin Chen, David Evans | Published: 2022-12-15 | Updated: 2024-04-05 Privacy Risk ManagementPrivacy Protection MethodMembership Inference 2022.12.15 2025.05.28 Literature Database
Towards Fleet-wide Sharing of Wind Turbine Condition Information through Privacy-preserving Federated Learning Authors: Lorin Jenkel, Stefan Jonas, Angela Meyer | Published: 2022-12-07 | Updated: 2023-07-12 Privacy Protection MethodModel SelectionCondition Monitoring 2022.12.07 2025.05.28 Literature Database
StyleGAN as a Utility-Preserving Face De-identification Method Authors: Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh | Published: 2022-12-05 | Updated: 2023-08-31 Privacy Protection MethodPrivacy AssessmentFace Recognition Method 2022.12.05 2025.05.28 Literature Database
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning Authors: Pengyu Qiu, Xuhong Zhang, Shouling Ji, Chong Fu, Xing Yang, Ting Wang | Published: 2022-12-01 | Updated: 2024-01-22 WatermarkingPrivacy Protection MethodReconstruction Durability 2022.12.01 2025.05.28 Literature Database
SoK: Secure Human-centered Wireless Sensing Authors: Wei Sun, Tingjun Chen, Neil Gong | Published: 2022-11-22 | Updated: 2024-03-09 Privacy Protection MethodSignal AnalysisWireless Channel Detection 2022.11.22 2025.05.28 Literature Database