Research on Data Right Confirmation Mechanism of Federated Learning based on Blockchain Authors: Xiaogang Cheng, Ren Guo | Published: 2024-09-13 Smart ContractData Rights MechanismPrivacy Protection 2024.09.13 2025.05.27 Literature Database
HERL: Tiered Federated Learning with Adaptive Homomorphic Encryption using Reinforcement Learning Authors: Jiaxang Tang, Zeshan Fayyaz, Mohammad A. Salahuddin, Raouf Boutaba, Zhi-Li Zhang, Ali Anwar | Published: 2024-09-11 Integration of FL and HEPrivacy ProtectionCommunication Efficiency 2024.09.11 2025.05.27 Literature Database
SoK: Security and Privacy Risks of Medical AI Authors: Yuanhaur Chang, Han Liu, Evin Jaff, Chenyang Lu, Ning Zhang | Published: 2024-09-11 Backdoor AttackPrivacy ProtectionThreats of Medical AI 2024.09.11 2025.05.27 Literature Database
Exploring User-level Gradient Inversion with a Diffusion Prior Authors: Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Bradley Malin, Kieran Parsons, Ye Wang | Published: 2024-09-11 WatermarkingPrivacy ProtectionPrivacy Protection Method 2024.09.11 2025.05.27 Literature Database
A Pervasive, Efficient and Private Future: Realizing Privacy-Preserving Machine Learning Through Hybrid Homomorphic Encryption Authors: Khoa Nguyen, Mindaugas Budzys, Eugene Frimpong, Tanveer Khan, Antonis Michalas | Published: 2024-09-10 Privacy ProtectionCryptographyCommunication Efficiency 2024.09.10 2025.05.27 Literature Database
Privacy-Preserving Data Linkage Across Private and Public Datasets for Collaborative Agriculture Research Authors: Osama Zafar, Rosemarie Santa Gonzalez, Gabriel Wilkins, Alfonso Morales, Erman Ayday | Published: 2024-09-09 Privacy ProtectionPrivacy Protection MethodAgricultural Data Privacy 2024.09.09 2025.05.27 Literature Database
Exploring User Privacy Awareness on GitHub: An Empirical Study Authors: Costanza Alfieri, Juri Di Rocco, Paola Inverardi, Phuong T. Nguyen | Published: 2024-09-06 | Updated: 2024-09-10 Privacy ProtectionPrompt InjectionUser Activity Analysis 2024.09.06 2025.05.27 Literature Database
Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints Authors: Blerim Rexha, Arbena Musa, Kamer Vishi, Edlira Martiri | Published: 2024-09-01 Data CollectionFingerprinting MethodPrivacy Protection 2024.09.01 2025.05.27 Literature Database
Privacy Technologies for Financial Intelligence Authors: Yang Li, Thilina Ranbaduge, Kee Siong Ng | Published: 2024-08-19 Privacy ProtectionPrivacy Protection MethodFinancial Intelligence 2024.08.19 2025.05.27 Literature Database
Casper: Prompt Sanitization for Protecting User Privacy in Web-Based Large Language Models Authors: Chun Jie Chong, Chenxi Hou, Zhihao Yao, Seyed Mohammadjavad Seyed Talebi | Published: 2024-08-13 LLM SecurityPrivacy ProtectionPrompt Injection 2024.08.13 2025.05.27 Literature Database