Privacy Protection

PrivateLoRA For Efficient Privacy Preserving LLM

Authors: Yiming Wang, Yu Lin, Xiaodong Zeng, Guannan Zhang | Published: 2023-11-23
Training Protocol
Privacy Protection
Membership Inference

Enhancing Intrusion Detection In Internet Of Vehicles Through Federated Learning

Authors: Abhishek Sebastian, Pragna R, Sudhakaran G, Renjith P N, Leela Karthikeyan H | Published: 2023-11-23
Data Preprocessing
Privacy Protection
Intrusion Detection System

From Principle to Practice: Vertical Data Minimization for Machine Learning

Authors: Robin Staab, Nikola Jovanović, Mislav Balunović, Martin Vechev | Published: 2023-11-17 | Updated: 2023-11-22
Data Management System
Privacy Protection
Evaluation Method

Are Normalizing Flows the Key to Unlocking the Exponential Mechanism?

Authors: Robert A. Bridges, Vandy J. Tombs, Christopher B. Stanley | Published: 2023-11-15 | Updated: 2024-06-11
Privacy Protection
Convergence Property
Machine Learning Method

Input Reconstruction Attack against Vertical Federated Large Language Models

Authors: Fei Zheng | Published: 2023-11-07 | Updated: 2023-11-24
Characteristics of VFL
Privacy Protection
Defense Method

DPZero: Private Fine-Tuning of Language Models without Backpropagation

Authors: Liang Zhang, Bingcong Li, Kiran Koshy Thekumparampil, Sewoong Oh, Niao He | Published: 2023-10-14 | Updated: 2024-06-06
Privacy Protection
Privacy Protection Method
Optimization Methods

Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption

Authors: Hassan Jameel Asghar, Zhigang Lu, Zhongrui Zhao, Dali Kaafar | Published: 2023-10-04 | Updated: 2024-10-07
Watermarking
Privacy Protection
Loss Function

zkFL: Zero-Knowledge Proof-based Gradient Aggregation for Federated Learning

Authors: Zhipeng Wang, Nanqing Dong, Jiahao Sun, William Knottenbelt, Yike Guo | Published: 2023-10-04 | Updated: 2024-05-10
Watermarking
Privacy Protection
Federated Learning

FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks

Authors: Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad Sadeghi | Published: 2023-10-03
Backdoor Attack
Privacy Protection
Poisoning

Generating tabular datasets under differential privacy

Authors: Gianluca Truda | Published: 2023-08-28
Data Generation
Privacy Protection
Privacy Protection Method