Tracing Privacy Leakage of Language Models to Training Data via Adjusted Influence Functions Authors: Jinxin Liu, Zao Yang | Published: 2024-08-20 | Updated: 2024-09-05 LLM Performance EvaluationPrivacy Protection MethodEvaluation Method 2024.08.20 2025.05.27 Literature Database
Privacy Technologies for Financial Intelligence Authors: Yang Li, Thilina Ranbaduge, Kee Siong Ng | Published: 2024-08-19 Privacy ProtectionPrivacy Protection MethodFinancial Intelligence 2024.08.19 2025.05.27 Literature Database
Mitigating Noise Detriment in Differentially Private Federated Learning with Model Pre-training Authors: Huitong Jin, Yipeng Zhou, Laizhong Cui, Quan Z. Sheng | Published: 2024-08-18 WatermarkingPrivacy Protection MethodModel Performance Evaluation 2024.08.18 2025.05.27 Literature Database
DePrompt: Desensitization and Evaluation of Personal Identifiable Information in Large Language Model Prompts Authors: Xiongtao Sun, Gan Liu, Zhipeng He, Hui Li, Xiaoguang Li | Published: 2024-08-16 LLM SecurityPrivacy Protection MethodPrompt Injection 2024.08.16 2025.05.27 Literature Database
Privacy in Federated Learning Authors: Jaydip Sen, Hetvi Waghela, Sneha Rakshit | Published: 2024-08-12 Privacy ProtectionPrivacy Protection MethodModel Performance Evaluation 2024.08.12 2025.05.27 Literature Database
Lancelot: Towards Efficient and Privacy-Preserving Byzantine-Robust Federated Learning within Fully Homomorphic Encryption Authors: Siyang Jiang, Hao Yang, Qipeng Xie, Chuan Ma, Sen Wang, Guoliang Xing | Published: 2024-08-12 Integration of FL and HEWatermarkingPrivacy Protection Method 2024.08.12 2025.05.27 Literature Database
Fast John Ellipsoid Computation with Differential Privacy Optimization Authors: Jiuxiang Gu, Xiaoyu Li, Yingyu Liang, Zhenmei Shi, Zhao Song, Junwei Yu | Published: 2024-08-12 AlgorithmPrivacy Protection MethodConvergence Guarantee 2024.08.12 2025.05.27 Literature Database
Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum Era Authors: Saleh Darzi, Attila A. Yavuz | Published: 2024-08-08 DoS MitigationPrivacy Protection MethodDefense Method 2024.08.08 2025.05.27 Literature Database
Pre-trained Encoder Inference: Revealing Upstream Encoders In Downstream Machine Learning Services Authors: Shaopeng Fu, Xuexue Sun, Ke Qing, Tianhang Zheng, Di Wang | Published: 2024-08-05 Privacy Protection MethodMembership InferenceAttack Method 2024.08.05 2025.05.27 Literature Database
Privacy-Preserving Hierarchical Model-Distributed Inference Authors: Fatemeh Jafarian Dehkordi, Yasaman Keshtkarjahromi, Hulya Seferoglu | Published: 2024-07-25 | Updated: 2024-09-15 Edge ComputingPrivacy Protection MethodCommunication Efficiency 2024.07.25 2025.05.27 Literature Database