Near Exact Privacy Amplification for Matrix Mechanisms Authors: Christopher A. Choquette-Choo, Arun Ganesh, Saminul Haque, Thomas Steinke, Abhradeep Thakurta | Published: 2024-10-08 | Updated: 2025-03-20 Privacy ProtectionPrivacy Protection Method 2024.10.08 2025.05.27 Literature Database
KnowledgeSG: Privacy-Preserving Synthetic Text Generation with Knowledge Distillation from Server Authors: Wenhao Wang, Xiaoyu Liang, Rui Ye, Jingyi Chai, Siheng Chen, Yanfeng Wang | Published: 2024-10-08 | Updated: 2024-10-10 Privacy ProtectionPrivacy Protection Method 2024.10.08 2025.05.27 Literature Database
A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers Authors: Peng Tang, Xin Li, Yuxin Chen, Weidong Qiu, Haochen Mei, Allison Holmes, Fenghua Li, Shujun Li | Published: 2024-10-07 Privacy ProtectionPrivacy Protection MethodPrivacy Technique 2024.10.07 2025.05.27 Literature Database
Adaptively Private Next-Token Prediction of Large Language Models Authors: James Flemings, Meisam Razaviyayn, Murali Annavaram | Published: 2024-10-02 Privacy ProtectionPrivacy Protection MethodPrivacy Technique 2024.10.02 2025.05.27 Literature Database
Scalable Differential Privacy Mechanisms for Real-Time Machine Learning Applications Authors: Jessica Smith, David Williams, Emily Brown | Published: 2024-09-16 Privacy ProtectionPrivacy Protection MethodPrivacy Technique 2024.09.16 2025.05.27 Literature Database
Federated Learning with Quantum Computing and Fully Homomorphic Encryption: A Novel Computing Paradigm Shift in Privacy-Preserving ML Authors: Siddhant Dutta, Pavana P Karanth, Pedro Maciel Xavier, Iago Leal de Freitas, Nouhaila Innan, Sadok Ben Yahia, Muhammad Shafique, David E. Bernal Neira | Published: 2024-09-14 | Updated: 2024-10-12 Privacy ProtectionPrivacy Protection MethodQuantum Framework 2024.09.14 2025.05.27 Literature Database
Exploring User-level Gradient Inversion with a Diffusion Prior Authors: Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Bradley Malin, Kieran Parsons, Ye Wang | Published: 2024-09-11 WatermarkingPrivacy ProtectionPrivacy Protection Method 2024.09.11 2025.05.27 Literature Database
Privacy-Preserving Data Linkage Across Private and Public Datasets for Collaborative Agriculture Research Authors: Osama Zafar, Rosemarie Santa Gonzalez, Gabriel Wilkins, Alfonso Morales, Erman Ayday | Published: 2024-09-09 Privacy ProtectionPrivacy Protection MethodAgricultural Data Privacy 2024.09.09 2025.05.27 Literature Database
Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm? Authors: Rui Wen, Michael Backes, Yang Zhang | Published: 2024-09-05 Backdoor AttackPrivacy Protection MethodMembership Inference 2024.09.05 2025.05.27 Literature Database
Defending against Model Inversion Attacks via Random Erasing Authors: Viet-Hung Tran, Ngoc-Bao Nguyen, Son T. Mai, Hans Vandierendonck, Ngai-man Cheung | Published: 2024-09-02 WatermarkingPrivacy Protection MethodDefense Method 2024.09.02 2025.05.27 Literature Database