A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses Authors: Caelin G. Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira | Published: 2023-10-18 Privacy Protection MethodPrivacy TechniqueDefense Method 2023.10.18 2025.05.28 Literature Database
Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning Authors: Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem | Published: 2023-10-17 Privacy TechniqueModel Extraction AttackAttack Evaluation 2023.10.17 2025.05.28 Literature Database
Privacy-Preserving Graph Embedding based on Local Differential Privacy Authors: Zening Li, Rong-Hua Li, Meihao Liao, Fusheng Jin, Guoren Wang | Published: 2023-10-17 | Updated: 2024-08-04 Graph EmbeddingPrivacy Protection MethodPrivacy Technique 2023.10.17 2025.05.28 Literature Database
Privacy-Preserving In-Context Learning with Differentially Private Few-Shot Generation Authors: Xinyu Tang, Richard Shin, Huseyin A. Inan, Andre Manoel, Fatemehsadat Mireshghallah, Zinan Lin, Sivakanth Gopi, Janardhan Kulkarni, Robert Sim | Published: 2023-09-21 | Updated: 2024-01-28 Data Protection MethodData GenerationPrivacy Technique 2023.09.21 2025.05.28 Literature Database
“It’s a Fair Game”, or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents Authors: Zhiping Zhang, Michelle Jia, Hao-Ping Lee, Bingsheng Yao, Sauvik Das, Ada Lerner, Dakuo Wang, Tianshi Li | Published: 2023-09-20 | Updated: 2024-04-02 Data LeakagePrivacy TechniqueUser Education 2023.09.20 2025.05.28 Literature Database
FRAMU: Attention-based Machine Unlearning using Federated Reinforcement Learning Authors: Thanveer Shaik, Xiaohui Tao, Lin Li, Haoran Xie, Taotao Cai, Xiaofeng Zhu, Qing Li | Published: 2023-09-19 | Updated: 2024-02-02 AlgorithmPrivacy TechniqueFederated Learning 2023.09.19 2025.05.28 Literature Database
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services Authors: Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue | Published: 2023-09-15 | Updated: 2024-01-15 Data Protection MethodPrivacy TechniqueOverfitting and Memorization 2023.09.15 2025.05.28 Literature Database
Mitigate Replication and Copying in Diffusion Models with Generalized Caption and Dual Fusion Enhancement Authors: Chenghao Li, Dake Chen, Yuke Zhang, Peter A. Beerel | Published: 2023-09-13 | Updated: 2024-01-23 Data GenerationPrivacy Techniqueevaluation metrics 2023.09.13 2025.05.28 Literature Database
Recovering from Privacy-Preserving Masking with Large Language Models Authors: Arpita Vats, Zhe Liu, Peng Su, Debjyoti Paul, Yingyi Ma, Yutong Pang, Zeeshan Ahmed, Ozlem Kalinli | Published: 2023-09-12 | Updated: 2023-12-14 LLM Performance EvaluationData Protection MethodPrivacy Technique 2023.09.12 2025.05.28 Literature Database
Artificial Intelligence for Web 3.0: A Comprehensive Survey Authors: Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin, Shen | Published: 2023-08-17 Data Protection MethodPrivacy TechniqueDeep Learning Method 2023.08.17 2025.05.28 Literature Database