Can Large Language Models Really Recognize Your Name? Authors: Dzung Pham, Peter Kairouz, Niloofar Mireshghallah, Eugene Bagdasarian, Chau Minh Pham, Amir Houmansadr | Published: 2025-05-20 LLM SecurityIndirect Prompt InjectionPrivacy Leakage 2025.05.20 2025.05.28 Literature Database
Fragments to Facts: Partial-Information Fragment Inference from LLMs Authors: Lucas Rosenblatt, Bin Han, Robert Wolfe, Bill Howe | Published: 2025-05-20 Privacy LeakagePrompt leakingThreats of Medical AI 2025.05.20 2025.05.28 Literature Database
IP Leakage Attacks Targeting LLM-Based Multi-Agent Systems Authors: Liwen Wang, Wenxuan Wang, Shuai Wang, Zongjie Li, Zhenlan Ji, Zongyi Lyu, Daoyuan Wu, Shing-Chi Cheung | Published: 2025-05-18 | Updated: 2025-05-20 Indirect Prompt InjectionPrivacy Leakage情報伝播手法 2025.05.18 2025.05.28 Literature Database
How Much Privacy Does Federated Learning with Secure Aggregation Guarantee? Authors: Ahmed Roushdy Elkordy, Jiang Zhang, Yahya H. Ezzeldin, Konstantinos Psounis, Salman Avestimehr | Published: 2022-08-03 Secure AggregationPrivacy LeakageEfficiency of Distributed Learning 2022.08.03 2025.05.28 Literature Database
A New Implementation of Federated Learning for Privacy and Security Enhancement Authors: Xiang Ma, Haijian Sun, Rose Qingyang Hu, Yi Qian | Published: 2022-08-03 Byzantine Consensus MechanismPrivacy LeakageMachine Learning 2022.08.03 2025.05.28 Literature Database
On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel Authors: Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Pabitra Mitra | Published: 2022-08-01 | Updated: 2024-02-17 Privacy LeakageMembership InferenceMachine Learning 2022.08.01 2025.05.28 Literature Database
SecretGen: Privacy Recovery on Pre-Trained Models via Distribution Discrimination Authors: Zhuowen Yuan, Fan Wu, Yunhui Long, Chaowei Xiao, Bo Li | Published: 2022-07-25 Privacy ClassificationPrivacy LeakageGenerative Model 2022.07.25 2025.05.28 Literature Database
On the (In)security of Peer-to-Peer Decentralized Machine Learning Authors: Dario Pasquini, Mathilde Raynal, Carmela Troncoso | Published: 2022-05-17 | Updated: 2023-11-10 Attack Methods against DFLPrivacy TechniquePrivacy Leakage 2022.05.17 2025.05.28 Literature Database
You Don’t Know My Favorite Color: Preventing Dialogue Representations from Revealing Speakers’ Private Personas Authors: Haoran Li, Yangqiu Song, Lixin Fan | Published: 2022-04-26 Privacy LeakageLoss FunctionAttackers and Malicious Devices 2022.04.26 2025.05.28 Literature Database
Private Retrieval, Computing and Learning: Recent Progress and Future Challenges Authors: Sennur Ulukus, Salman Avestimehr, Michael Gastpar, Syed Jafar, Ravi Tandon, Chao Tian | Published: 2021-07-30 Basic Concept of PIRPrivacy LeakageFederated Learning 2021.07.30 2025.05.28 Literature Database