Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum Era Authors: Saleh Darzi, Attila A. Yavuz | Published: 2024-08-08 DoS MitigationPrivacy Protection MethodDefense Method 2024.08.08 2025.05.27 Literature Database
Pre-trained Encoder Inference: Revealing Upstream Encoders In Downstream Machine Learning Services Authors: Shaopeng Fu, Xuexue Sun, Ke Qing, Tianhang Zheng, Di Wang | Published: 2024-08-05 Privacy Protection MethodMembership InferenceAttack Method 2024.08.05 2025.05.27 Literature Database
Privacy-Preserving Hierarchical Model-Distributed Inference Authors: Fatemeh Jafarian Dehkordi, Yasaman Keshtkarjahromi, Hulya Seferoglu | Published: 2024-07-25 | Updated: 2024-09-15 Edge ComputingPrivacy Protection MethodCommunication Efficiency 2024.07.25 2025.05.27 Literature Database
Theoretical Analysis of Privacy Leakage in Trustworthy Federated Learning: A Perspective from Linear Algebra and Optimization Theory Authors: Xiaojin Zhang, Wei Chen | Published: 2024-07-23 Privacy ProtectionPrivacy Protection MethodOptimization Problem 2024.07.23 2025.05.27 Literature Database
Private prediction for large-scale synthetic text generation Authors: Kareem Amin, Alex Bie, Weiwei Kong, Alexey Kurakin, Natalia Ponomareva, Umar Syed, Andreas Terzis, Sergei Vassilvitskii | Published: 2024-07-16 | Updated: 2024-10-09 WatermarkingPrivacy Protection MethodPrompt Injection 2024.07.16 2025.05.27 Literature Database
Explainable Differential Privacy-Hyperdimensional Computing for Balancing Privacy and Transparency in Additive Manufacturing Monitoring Authors: Fardin Jalil Piran, Prathyush P. Poduval, Hamza Errahmouni Barkam, Mohsen Imani, Farhad Imani | Published: 2024-07-09 | Updated: 2025-03-17 Privacy Protection MethodPrivacy Design PrinciplesDifferential Privacy 2024.07.09 2025.05.27 Literature Database
Approximating Two-Layer ReLU Networks for Hidden State Analysis in Differential Privacy Authors: Antti Koskela | Published: 2024-07-05 | Updated: 2024-10-11 Privacy Protection MethodLoss FunctionOptimization Problem 2024.07.05 2025.05.27 Literature Database
Attack-Aware Noise Calibration for Differential Privacy Authors: Bogdan Kulynych, Juan Felipe Gomez, Georgios Kaissis, Flavio du Pin Calmon, Carmela Troncoso | Published: 2024-07-02 | Updated: 2024-11-07 Privacy ProtectionPrivacy Protection MethodComputational Efficiency 2024.07.02 2025.05.27 Literature Database
Mind the Privacy Unit! User-Level Differential Privacy for Language Model Fine-Tuning Authors: Lynn Chua, Badih Ghazi, Yangsibo Huang, Pritish Kamath, Ravi Kumar, Daogao Liu, Pasin Manurangsi, Amer Sinha, Chiyuan Zhang | Published: 2024-06-20 | Updated: 2024-08-16 WatermarkingData Selection StrategyPrivacy Protection Method 2024.06.20 2025.05.27 Literature Database
Data Plagiarism Index: Characterizing the Privacy Risk of Data-Copying in Tabular Generative Models Authors: Joshua Ward, Chi-Hua Wang, Guang Cheng | Published: 2024-06-18 Data Privacy AssessmentPrivacy Protection MethodMembership Inference 2024.06.18 2025.05.27 Literature Database