Privacy Technique

A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses

Authors: Caelin G. Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira | Published: 2023-10-18
Privacy Protection Method
Privacy Technique
Defense Method

Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning

Authors: Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem | Published: 2023-10-17
Privacy Technique
Model Extraction Attack
Attack Evaluation

Privacy-Preserving Graph Embedding based on Local Differential Privacy

Authors: Zening Li, Rong-Hua Li, Meihao Liao, Fusheng Jin, Guoren Wang | Published: 2023-10-17 | Updated: 2024-08-04
Graph Embedding
Privacy Protection Method
Privacy Technique

Privacy-Preserving In-Context Learning with Differentially Private Few-Shot Generation

Authors: Xinyu Tang, Richard Shin, Huseyin A. Inan, Andre Manoel, Fatemehsadat Mireshghallah, Zinan Lin, Sivakanth Gopi, Janardhan Kulkarni, Robert Sim | Published: 2023-09-21 | Updated: 2024-01-28
Data Protection Method
Data Generation
Privacy Technique

“It’s a Fair Game”, or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents

Authors: Zhiping Zhang, Michelle Jia, Hao-Ping Lee, Bingsheng Yao, Sauvik Das, Ada Lerner, Dakuo Wang, Tianshi Li | Published: 2023-09-20 | Updated: 2024-04-02
Data Leakage
Privacy Technique
User Education

FRAMU: Attention-based Machine Unlearning using Federated Reinforcement Learning

Authors: Thanveer Shaik, Xiaohui Tao, Lin Li, Haoran Xie, Taotao Cai, Xiaofeng Zhu, Qing Li | Published: 2023-09-19 | Updated: 2024-02-02
Algorithm
Privacy Technique
Federated Learning

A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services

Authors: Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue | Published: 2023-09-15 | Updated: 2024-01-15
Data Protection Method
Privacy Technique
Overfitting and Memorization

Mitigate Replication and Copying in Diffusion Models with Generalized Caption and Dual Fusion Enhancement

Authors: Chenghao Li, Dake Chen, Yuke Zhang, Peter A. Beerel | Published: 2023-09-13 | Updated: 2024-01-23
Data Generation
Privacy Technique
evaluation metrics

Recovering from Privacy-Preserving Masking with Large Language Models

Authors: Arpita Vats, Zhe Liu, Peng Su, Debjyoti Paul, Yingyi Ma, Yutong Pang, Zeeshan Ahmed, Ozlem Kalinli | Published: 2023-09-12 | Updated: 2023-12-14
LLM Performance Evaluation
Data Protection Method
Privacy Technique

Artificial Intelligence for Web 3.0: A Comprehensive Survey

Authors: Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin, Shen | Published: 2023-08-17
Data Protection Method
Privacy Technique
Deep Learning Method