Privacy Leakage

Can Large Language Models Really Recognize Your Name?

Authors: Dzung Pham, Peter Kairouz, Niloofar Mireshghallah, Eugene Bagdasarian, Chau Minh Pham, Amir Houmansadr | Published: 2025-05-20
LLM Security
Indirect Prompt Injection
Privacy Leakage

Fragments to Facts: Partial-Information Fragment Inference from LLMs

Authors: Lucas Rosenblatt, Bin Han, Robert Wolfe, Bill Howe | Published: 2025-05-20
Privacy Leakage
Prompt leaking
Threats of Medical AI

IP Leakage Attacks Targeting LLM-Based Multi-Agent Systems

Authors: Liwen Wang, Wenxuan Wang, Shuai Wang, Zongjie Li, Zhenlan Ji, Zongyi Lyu, Daoyuan Wu, Shing-Chi Cheung | Published: 2025-05-18 | Updated: 2025-05-20
Indirect Prompt Injection
Privacy Leakage
情報伝播手法

How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?

Authors: Ahmed Roushdy Elkordy, Jiang Zhang, Yahya H. Ezzeldin, Konstantinos Psounis, Salman Avestimehr | Published: 2022-08-03
Secure Aggregation
Privacy Leakage
Efficiency of Distributed Learning

A New Implementation of Federated Learning for Privacy and Security Enhancement

Authors: Xiang Ma, Haijian Sun, Rose Qingyang Hu, Yi Qian | Published: 2022-08-03
Byzantine Consensus Mechanism
Privacy Leakage
Machine Learning

On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel

Authors: Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Pabitra Mitra | Published: 2022-08-01 | Updated: 2024-02-17
Privacy Leakage
Membership Inference
Machine Learning

SecretGen: Privacy Recovery on Pre-Trained Models via Distribution Discrimination

Authors: Zhuowen Yuan, Fan Wu, Yunhui Long, Chaowei Xiao, Bo Li | Published: 2022-07-25
Privacy Classification
Privacy Leakage
Generative Model

On the (In)security of Peer-to-Peer Decentralized Machine Learning

Authors: Dario Pasquini, Mathilde Raynal, Carmela Troncoso | Published: 2022-05-17 | Updated: 2023-11-10
Attack Methods against DFL
Privacy Technique
Privacy Leakage

You Don’t Know My Favorite Color: Preventing Dialogue Representations from Revealing Speakers’ Private Personas

Authors: Haoran Li, Yangqiu Song, Lixin Fan | Published: 2022-04-26
Privacy Leakage
Loss Function
Attackers and Malicious Devices

Private Retrieval, Computing and Learning: Recent Progress and Future Challenges

Authors: Sennur Ulukus, Salman Avestimehr, Michael Gastpar, Syed Jafar, Ravi Tandon, Chao Tian | Published: 2021-07-30
Basic Concept of PIR
Privacy Leakage
Federated Learning