A Multiparty Homomorphic Encryption Approach to Confidential Federated Kaplan Meier Survival Analysis Authors: Narasimha Raghavan Veeraragavan, Svetlana Boudko, Jan Franz Nygård | Published: 2024-12-29 Kaplan-Meier EstimationPrivacy ProtectionCryptography 2024.12.29 2025.05.27 Literature Database
On Large Language Models in Mission-Critical IT Governance: Are We Ready Yet? Authors: Matteo Esposito, Francesco Palagiano, Valentina Lenarduzzi, Davide Taibi | Published: 2024-12-16 | Updated: 2025-01-10 Privacy ProtectionFrameworkRisk Management 2024.12.16 2025.05.27 Literature Database
$(ε, δ)$-Differentially Private Partial Least Squares Regression Authors: Ramin Nikzad-Langerodi, Mohit Kumar, Du Nguyen Duy, Mahtab Alghasi | Published: 2024-12-12 Privacy Protection 2024.12.12 2025.05.27 Literature Database
Intermediate Outputs Are More Sensitive Than You Think Authors: Tao Huang, Qingyu Huang, Jiayang Meng | Published: 2024-12-01 Privacy ProtectionMembership Inference 2024.12.01 2025.05.27 Literature Database
TinyML NLP Scheme for Semantic Wireless Sentiment Classification with Privacy Preservation Authors: Ahmed Y. Radwan, Mohammad Shehab, Mohamed-Slim Alouini | Published: 2024-11-09 | Updated: 2025-04-21 Energy-Based ModelPrivacy ProtectionCommunication Model 2024.11.09 2025.05.27 Literature Database
Privacy-Preserving Federated Learning with Differentially Private Hyperdimensional Computing Authors: Fardin Jalil Piran, Zhiling Chen, Mohsen Imani, Farhad Imani | Published: 2024-11-02 | Updated: 2025-03-22 Privacy ProtectionFramework 2024.11.02 2025.05.27 Literature Database
Privacy-Preserving Dynamic Assortment Selection Authors: Young Hyun Cho, Will Wei Sun | Published: 2024-10-29 Privacy ProtectionPrivacy Protection MethodOptimization Problem 2024.10.29 2025.05.27 Literature Database
Federated Learning in Practice: Reflections and Projections Authors: Katharine Daly, Hubert Eichner, Peter Kairouz, H. Brendan McMahan, Daniel Ramage, Zheng Xu | Published: 2024-10-11 Privacy ProtectionPrivacy Protection MethodPoisoning 2024.10.11 2025.05.27 Literature Database
Decoding Secret Memorization in Code LLMs Through Token-Level Characterization Authors: Yuqing Nie, Chong Wang, Kailong Wang, Guoai Xu, Guosheng Xu, Haoyu Wang | Published: 2024-10-11 LLM Performance EvaluationPrivacy Protection 2024.10.11 2025.05.27 Literature Database
PILLAR: an AI-Powered Privacy Threat Modeling Tool Authors: Majid Mollaeefar, Andrea Bissoli, Silvio Ranise | Published: 2024-10-11 Privacy ProtectionPrivacy Protection MethodPrompt Injection 2024.10.11 2025.05.27 Literature Database