Privacy Technique

Everyone’s Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors

Authors: Yuqi Niu, Weidong Qiu, Peng Tang, Lifan Wang, Shuo Chen, Shujun Li, Nadin Kokciyan, Ben Niu | Published: 2025-01-20
Privacy Technique
Attack that Analyzes Images with AI to Infer Personal Information
Facial Recognition Technology

A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers

Authors: Peng Tang, Xin Li, Yuxin Chen, Weidong Qiu, Haochen Mei, Allison Holmes, Fenghua Li, Shujun Li | Published: 2024-10-07
Privacy Protection
Privacy Protection Method
Privacy Technique

Adaptively Private Next-Token Prediction of Large Language Models

Authors: James Flemings, Meisam Razaviyayn, Murali Annavaram | Published: 2024-10-02
Privacy Protection
Privacy Protection Method
Privacy Technique

An interdisciplinary exploration of trade-offs between energy, privacy and accuracy aspects of data

Authors: Pepijn de Reus, Kyra Dresen, Ana Oprescu, Kristina Irion, Ans Kolk | Published: 2024-09-30 | Updated: 2024-10-12
Privacy Protection
Privacy Technique

Scalable Differential Privacy Mechanisms for Real-Time Machine Learning Applications

Authors: Jessica Smith, David Williams, Emily Brown | Published: 2024-09-16
Privacy Protection
Privacy Protection Method
Privacy Technique

SoK: Memorisation in machine learning

Authors: Dmitrii Usynin, Moritz Knolle, Georgios Kaissis | Published: 2023-11-06
Privacy Technique
Memory Evaluation
Deep Learning Method

DEPN: Detecting and Editing Privacy Neurons in Pretrained Language Models

Authors: Xinwei Wu, Junzhuo Li, Minghui Xu, Weilong Dong, Shuangzhi Wu, Chao Bian, Deyi Xiong | Published: 2023-10-31 | Updated: 2023-12-05
Privacy Protection Method
Privacy Technique
Model editing techniques

Unified Enhancement of Privacy Bounds for Mixture Mechanisms via $f$-Differential Privacy

Authors: Chendi Wang, Buxin Su, Jiayuan Ye, Reza Shokri, Weijie J. Su | Published: 2023-10-30 | Updated: 2023-11-01
Privacy Technique
Robustness Evaluation
Computational Efficiency

Label-Only Model Inversion Attacks via Knowledge Transfer

Authors: Ngoc-Bao Nguyen, Keshigeyan Chandrasegaran, Milad Abdollahzadeh, Ngai-Man Cheung | Published: 2023-10-30
Privacy Technique
Attack Evaluation
Deep Learning Method

Assessment of Differentially Private Synthetic Data for Utility and Fairness in End-to-End Machine Learning Pipelines for Tabular Data

Authors: Mayana Pereira, Meghana Kshirsagar, Sumit Mukherjee, Rahul Dodhia, Juan Lavista Ferres, Rafael de Sousa | Published: 2023-10-30
Data Generation
Privacy Technique
Experimental Validation