Federated Learning: An approach with Hybrid Homomorphic Encryption Authors: Pedro Correia, Ivan Silva, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-09-03 Integration of FL and HEPrivacy Design PrinciplesFederated Learning 2025.09.03 2025.09.05 Literature Database
A Comprehensive Guide to Differential Privacy: From Theory to User Expectations Authors: Napsu Karmitsa, Antti Airola, Tapio Pahikkala, Tinja Pitkämäki | Published: 2025-09-03 Detection of Poison Data for Backdoor AttacksPrivacy Design PrinciplesDifferential Privacy 2025.09.03 2025.09.05 Literature Database
Membership Inference Attacks on LLM-based Recommender Systems Authors: Jiajie He, Yuechun Gu, Min-Chun Chen, Keke Chen | Published: 2025-08-26 Privacy Design PrinciplesPrompt leakingMembership Inference 2025.08.26 2025.08.28 Literature Database
On the Security and Privacy of Federated Learning: A Survey with Attacks, Defenses, Frameworks, Applications, and Future Directions Authors: Daniel M. Jimenez-Gutierrez, Yelizaveta Falkouskaya, Jose L. Hernandez-Ramos, Aris Anagnostopoulos, Ioannis Chatzigiannakis, Andrea Vitaletti | Published: 2025-08-19 Privacy Design PrinciplesPoisoningDetection of Poisonous Data 2025.08.19 2025.08.21 Literature Database
Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds Authors: Jinyu Lu, Xinrong Sun, Yunting Tao, Tong Ji, Fanyu Kong, Guoqiang Yang | Published: 2025-08-18 Algorithm DesignPrivacy Design PrinciplesWatermark Design 2025.08.18 2025.08.20 Literature Database
The Man Behind the Sound: Demystifying Audio Private Attribute Profiling via Multimodal Large Language Model Agents Authors: Lixu Wang, Kaixiang Yao, Xinfeng Li, Dong Yang, Haoyang Li, Xiaofeng Wang, Wei Dong | Published: 2025-07-14 | Updated: 2025-08-20 Privacy Design PrinciplesPrompt leakingSecurity of Voice Recognition Systems 2025.07.14 2025.08.22 Literature Database
Privacy-Preserving Analytics for Smart Meter (AMI) Data: A Hybrid Approach to Comply with CPUC Privacy Regulations Authors: Benjamin Westrich | Published: 2025-05-13 Detection of Poison Data for Backdoor AttacksPrivacy Design PrinciplesCryptography 2025.05.13 2025.05.28 Literature Database
Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity Authors: Guang Yan, Yuhui Zhang, Zimu Guo, Lutan Zhao, Xiaojun Chen, Chen Wang, Wenhao Wang, Dan Meng, Rui Hou | Published: 2025-05-12 Sparsity OptimizationSparse RepresentationPrivacy Design Principles 2025.05.12 2025.05.28 Literature Database
Securing Genomic Data Against Inference Attacks in Federated Learning Environments Authors: Chetan Pathade, Shubham Patil | Published: 2025-05-12 Privacy Design PrinciplesAttribute Disclosure RiskDifferential Privacy 2025.05.12 2025.05.28 Literature Database
Cape: Context-Aware Prompt Perturbation Mechanism with Differential Privacy Authors: Haoqi Wu, Wei Dai, Li Wang, Qiang Yan | Published: 2025-05-09 | Updated: 2025-05-15 Token Identification MethodPrivacy Design PrinciplesEvaluation Method 2025.05.09 2025.05.28 Literature Database