Theoretical Analysis of Privacy Leakage in Trustworthy Federated Learning: A Perspective from Linear Algebra and Optimization Theory Authors: Xiaojin Zhang, Wei Chen | Published: 2024-07-23 Privacy ProtectionPrivacy Protection MethodOptimization Problem 2024.07.23 2025.05.27 Literature Database
Private prediction for large-scale synthetic text generation Authors: Kareem Amin, Alex Bie, Weiwei Kong, Alexey Kurakin, Natalia Ponomareva, Umar Syed, Andreas Terzis, Sergei Vassilvitskii | Published: 2024-07-16 | Updated: 2024-10-09 WatermarkingPrivacy Protection MethodPrompt Injection 2024.07.16 2025.05.27 Literature Database
Explainable Differential Privacy-Hyperdimensional Computing for Balancing Privacy and Transparency in Additive Manufacturing Monitoring Authors: Fardin Jalil Piran, Prathyush P. Poduval, Hamza Errahmouni Barkam, Mohsen Imani, Farhad Imani | Published: 2024-07-09 | Updated: 2025-03-17 Privacy Protection MethodPrivacy Design PrinciplesDifferential Privacy 2024.07.09 2025.05.27 Literature Database
Approximating Two-Layer ReLU Networks for Hidden State Analysis in Differential Privacy Authors: Antti Koskela | Published: 2024-07-05 | Updated: 2024-10-11 Privacy Protection MethodLoss FunctionOptimization Problem 2024.07.05 2025.05.27 Literature Database
Attack-Aware Noise Calibration for Differential Privacy Authors: Bogdan Kulynych, Juan Felipe Gomez, Georgios Kaissis, Flavio du Pin Calmon, Carmela Troncoso | Published: 2024-07-02 | Updated: 2024-11-07 Privacy ProtectionPrivacy Protection MethodComputational Efficiency 2024.07.02 2025.05.27 Literature Database
Mind the Privacy Unit! User-Level Differential Privacy for Language Model Fine-Tuning Authors: Lynn Chua, Badih Ghazi, Yangsibo Huang, Pritish Kamath, Ravi Kumar, Daogao Liu, Pasin Manurangsi, Amer Sinha, Chiyuan Zhang | Published: 2024-06-20 | Updated: 2024-08-16 WatermarkingData Selection StrategyPrivacy Protection Method 2024.06.20 2025.05.27 Literature Database
Data Plagiarism Index: Characterizing the Privacy Risk of Data-Copying in Tabular Generative Models Authors: Joshua Ward, Chi-Hua Wang, Guang Cheng | Published: 2024-06-18 Data Privacy AssessmentPrivacy Protection MethodMembership Inference 2024.06.18 2025.05.27 Literature Database
GoldCoin: Grounding Large Language Models in Privacy Laws via Contextual Integrity Theory Authors: Wei Fan, Haoran Li, Zheye Deng, Weiqi Wang, Yangqiu Song | Published: 2024-06-17 | Updated: 2024-10-04 LLM Performance EvaluationPrivacy Protection MethodPrompt Injection 2024.06.17 2025.05.27 Literature Database
Promoting Data and Model Privacy in Federated Learning through Quantized LoRA Authors: JianHao Zhu, Changze Lv, Xiaohua Wang, Muling Wu, Wenhao Liu, Tianlong Li, Zixuan Ling, Cenyuan Zhang, Xiaoqing Zheng, Xuanjing Huang | Published: 2024-06-16 WatermarkingPrivacy Protection MethodQuantization and Privacy 2024.06.16 2025.05.27 Literature Database
Really Unlearned? Verifying Machine Unlearning via Influential Sample Pairs Authors: Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou | Published: 2024-06-16 Privacy Protection MethodMembership InferenceModel Performance Evaluation 2024.06.16 2025.05.27 Literature Database