Privacy Protection Method

Tracing Privacy Leakage of Language Models to Training Data via Adjusted Influence Functions

Authors: Jinxin Liu, Zao Yang | Published: 2024-08-20 | Updated: 2024-09-05
LLM Performance Evaluation
Privacy Protection Method
Evaluation Method

Privacy Technologies for Financial Intelligence

Authors: Yang Li, Thilina Ranbaduge, Kee Siong Ng | Published: 2024-08-19
Privacy Protection
Privacy Protection Method
Financial Intelligence

Mitigating Noise Detriment in Differentially Private Federated Learning with Model Pre-training

Authors: Huitong Jin, Yipeng Zhou, Laizhong Cui, Quan Z. Sheng | Published: 2024-08-18
Watermarking
Privacy Protection Method
Model Performance Evaluation

DePrompt: Desensitization and Evaluation of Personal Identifiable Information in Large Language Model Prompts

Authors: Xiongtao Sun, Gan Liu, Zhipeng He, Hui Li, Xiaoguang Li | Published: 2024-08-16
LLM Security
Privacy Protection Method
Prompt Injection

Privacy in Federated Learning

Authors: Jaydip Sen, Hetvi Waghela, Sneha Rakshit | Published: 2024-08-12
Privacy Protection
Privacy Protection Method
Model Performance Evaluation

Lancelot: Towards Efficient and Privacy-Preserving Byzantine-Robust Federated Learning within Fully Homomorphic Encryption

Authors: Siyang Jiang, Hao Yang, Qipeng Xie, Chuan Ma, Sen Wang, Guoliang Xing | Published: 2024-08-12
Integration of FL and HE
Watermarking
Privacy Protection Method

Fast John Ellipsoid Computation with Differential Privacy Optimization

Authors: Jiuxiang Gu, Xiaoyu Li, Yingyu Liang, Zhenmei Shi, Zhao Song, Junwei Yu | Published: 2024-08-12
Algorithm
Privacy Protection Method
Convergence Guarantee

Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum Era

Authors: Saleh Darzi, Attila A. Yavuz | Published: 2024-08-08
DoS Mitigation
Privacy Protection Method
Defense Method

Pre-trained Encoder Inference: Revealing Upstream Encoders In Downstream Machine Learning Services

Authors: Shaopeng Fu, Xuexue Sun, Ke Qing, Tianhang Zheng, Di Wang | Published: 2024-08-05
Privacy Protection Method
Membership Inference
Attack Method

Privacy-Preserving Hierarchical Model-Distributed Inference

Authors: Fatemeh Jafarian Dehkordi, Yasaman Keshtkarjahromi, Hulya Seferoglu | Published: 2024-07-25 | Updated: 2024-09-15
Edge Computing
Privacy Protection Method
Communication Efficiency