Privacy Leaks by Adversaries: Adversarial Iterations for Membership Inference Attack Authors: Jing Xue, Zhishen Sun, Haishan Ye, Luo Luo, Xiangyu Chang, Ivor Tsang, Guang Dai | Published: 2025-06-03 Privacy AnalysisAdversarial ExampleWatermark Evaluation 2025.06.03 2025.06.05 Literature Database
Pr$εε$mpt: Sanitizing Sensitive Prompts for LLMs Authors: Amrita Roy Chowdhury, David Glukhov, Divyam Anshumaan, Prasad Chalasani, Nicolas Papernot, Somesh Jha, Mihir Bellare | Published: 2025-04-07 RAGIndirect Prompt InjectionPrivacy Analysis 2025.04.07 2025.05.27 Literature Database
Empirical Analysis of Privacy-Fairness-Accuracy Trade-offs in Federated Learning: A Step Towards Responsible AI Authors: Dawood Wasif, Dian Chen, Sindhuja Madabushi, Nithin Alluru, Terrence J. Moore, Jin-Hee Cho | Published: 2025-03-20 Privacy AnalysisFairness Trade-offDifferential Privacy 2025.03.20 2025.05.27 Literature Database
Unveiling Privacy Risks in LLM Agent Memory Authors: Bo Wang, Weiyi He, Shenglai Zeng, Zhen Xiang, Yue Xing, Jiliang Tang, Pengfei He | Published: 2025-02-17 | Updated: 2025-06-03 Privacy AnalysisPrompt leakingCauses of Information Leakage 2025.02.17 2025.06.05 Literature Database
Privacy Amplification by Structured Subsampling for Deep Differentially Private Time Series Forecasting Authors: Jan Schuchardt, Mina Dalirrooyfard, Jed Guzelkabaagac, Anderson Schneider, Yuriy Nevmyvaka, Stephan Günnemann | Published: 2025-02-04 | Updated: 2025-05-29 Privacy AnalysisDifferential PrivacyInformation-Theoretic Evaluation 2025.02.04 2025.05.31 Literature Database
Data Reconstruction Attacks and Defenses: A Systematic Evaluation Authors: Sheng Liu, Zihan Wang, Yuxiao Chen, Qi Lei | Published: 2024-02-13 | Updated: 2025-03-22 Privacy AnalysisModel RobustnessAdversarial attack 2024.02.13 2025.05.27 Literature Database
Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD Authors: Anvith Thudi, Hengrui Jia, Casey Meehan, Ilia Shumailov, Nicolas Papernot | Published: 2023-07-01 | Updated: 2024-07-16 Security AssuranceData ObfuscationPrivacy Analysis 2023.07.01 2025.05.28 Literature Database
Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting Authors: Ana-Maria Cretu, Daniel Jones, Yves-Alexandre de Montjoye, Shruti Tople | Published: 2023-06-08 | Updated: 2024-03-12 Privacy AnalysisMembership InferenceModel Architecture 2023.06.08 2025.05.28 Literature Database
Security and Privacy Problems in Voice Assistant Applications: A Survey Authors: Jingjin Li, Chao chen, Lei Pan, Mostafa Rahimi Azghadi, Hossein Ghodosi, Jun Zhang | Published: 2023-04-19 Backdoor AttackPrivacy AnalysisSpeech Recognition Process 2023.04.19 2025.05.28 Literature Database
A Randomized Approach for Tight Privacy Accounting Authors: Jiachen T. Wang, Saeed Mahloujifar, Tong Wu, Ruoxi Jia, Prateek Mittal | Published: 2023-04-17 | Updated: 2023-11-21 Privacy AnalysisPrivacy TechniqueStatistical Methods 2023.04.17 2025.05.28 Literature Database