Secure On-Device Video OOD Detection Without Backpropagation Authors: Shawn Li, Peilin Cai, Yuxiao Zhou, Zhiyu Ni, Renjie Liang, You Qin, Yi Nian, Zhengzhong Tu, Xiyang Hu, Yue Zhao | Published: 2025-03-08 | Updated: 2025-03-17 Privacy Protection MethodFrameworkDeep Learning 2025.03.08 2025.05.27 Literature Database
A hierarchical approach for assessing the vulnerability of tree-based classification models to membership inference attack Authors: Richard J. Preen, Jim Smith | Published: 2025-02-13 | Updated: 2025-06-12 Privacy Protection MethodModel Extraction AttackRisk Assessment 2025.02.13 2025.06.14 Literature Database
Privacy-Preserving Dynamic Assortment Selection Authors: Young Hyun Cho, Will Wei Sun | Published: 2024-10-29 Privacy ProtectionPrivacy Protection MethodOptimization Problem 2024.10.29 2025.05.27 Literature Database
Private Counterfactual Retrieval Authors: Mohamed Nomeir, Pasan Dissanayake, Shreya Meel, Sanghamitra Dutta, Sennur Ulukus | Published: 2024-10-17 | Updated: 2025-07-24 Privacy Protection MethodDistance Evaluation MethodWatermark Evaluation 2024.10.17 2025.07.26 Literature Database
Federated Learning in Practice: Reflections and Projections Authors: Katharine Daly, Hubert Eichner, Peter Kairouz, H. Brendan McMahan, Daniel Ramage, Zheng Xu | Published: 2024-10-11 Privacy ProtectionPrivacy Protection MethodPoisoning 2024.10.11 2025.05.27 Literature Database
PILLAR: an AI-Powered Privacy Threat Modeling Tool Authors: Majid Mollaeefar, Andrea Bissoli, Silvio Ranise | Published: 2024-10-11 Privacy ProtectionPrivacy Protection MethodPrompt Injection 2024.10.11 2025.05.27 Literature Database
Privately Learning from Graphs with Applications in Fine-tuning Large Language Models Authors: Haoteng Yin, Rongzhe Wei, Eli Chien, Pan Li | Published: 2024-10-10 Privacy ProtectionPrivacy Protection Method 2024.10.10 2025.05.27 Literature Database
Near Exact Privacy Amplification for Matrix Mechanisms Authors: Christopher A. Choquette-Choo, Arun Ganesh, Saminul Haque, Thomas Steinke, Abhradeep Thakurta | Published: 2024-10-08 | Updated: 2025-03-20 Privacy ProtectionPrivacy Protection Method 2024.10.08 2025.05.27 Literature Database
KnowledgeSG: Privacy-Preserving Synthetic Text Generation with Knowledge Distillation from Server Authors: Wenhao Wang, Xiaoyu Liang, Rui Ye, Jingyi Chai, Siheng Chen, Yanfeng Wang | Published: 2024-10-08 | Updated: 2024-10-10 Privacy ProtectionPrivacy Protection Method 2024.10.08 2025.05.27 Literature Database
A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers Authors: Peng Tang, Xin Li, Yuxin Chen, Weidong Qiu, Haochen Mei, Allison Holmes, Fenghua Li, Shujun Li | Published: 2024-10-07 Privacy ProtectionPrivacy Protection MethodPrivacy Technique 2024.10.07 2025.05.27 Literature Database