Model Hijacking Attack in Federated Learning Authors: Zheng Li, Siyuan Wu, Ruichuan Chen, Paarijaat Aditya, Istemi Ekin Akkus, Manohar Vanga, Min Zhang, Hao Li, Yang Zhang | Published: 2024-08-04 WatermarkingClass Mapping MethodPoisoning 2024.08.04 2025.05.27 Literature Database
PromptSAM+: Malware Detection based on Prompt Segment Anything Model Authors: Xingyuan Wei, Yichen Liu, Ce Li, Ning Li, Degang Sun, Yan Wang | Published: 2024-08-04 WatermarkingMalware ClassificationModel Performance Evaluation 2024.08.04 2025.05.27 Literature Database
A Survey on the Applications of Zero-Knowledge Proofs Authors: Ryan Lavin, Xuekai Liu, Hardhik Mohanty, Logan Norman, Giovanni Zaarour, Bhaskar Krishnamachari | Published: 2024-08-01 WatermarkingPrivacy ProtectionBlockchain Technology 2024.08.01 2025.05.27 Literature Database
A Hybrid Federated Kernel Regularized Least Squares Algorithm Authors: Celeste Damiani, Yulia Rodina, Sergio Decherchi | Published: 2024-07-24 AlgorithmWatermarkingComputational Efficiency 2024.07.24 2025.05.27 Literature Database
Private prediction for large-scale synthetic text generation Authors: Kareem Amin, Alex Bie, Weiwei Kong, Alexey Kurakin, Natalia Ponomareva, Umar Syed, Andreas Terzis, Sergei Vassilvitskii | Published: 2024-07-16 | Updated: 2024-10-09 WatermarkingPrivacy Protection MethodPrompt Injection 2024.07.16 2025.05.27 Literature Database
SLIP: Securing LLMs IP Using Weights Decomposition Authors: Yehonathan Refael, Adam Hakim, Lev Greenberg, Tal Aviv, Satya Lokam, Ben Fishman, Shachar Seidman | Published: 2024-07-15 | Updated: 2024-08-01 LLM SecurityWatermarkingSecure Communication Channel 2024.07.15 2025.05.27 Literature Database
On Discrete Prompt Optimization for Diffusion Models Authors: Ruochen Wang, Ting Liu, Cho-Jui Hsieh, Boqing Gong | Published: 2024-06-27 WatermarkingPrompt InjectionPrompt Engineering 2024.06.27 2025.05.27 Literature Database
Mind the Privacy Unit! User-Level Differential Privacy for Language Model Fine-Tuning Authors: Lynn Chua, Badih Ghazi, Yangsibo Huang, Pritish Kamath, Ravi Kumar, Daogao Liu, Pasin Manurangsi, Amer Sinha, Chiyuan Zhang | Published: 2024-06-20 | Updated: 2024-08-16 WatermarkingData Selection StrategyPrivacy Protection Method 2024.06.20 2025.05.27 Literature Database
Promoting Data and Model Privacy in Federated Learning through Quantized LoRA Authors: JianHao Zhu, Changze Lv, Xiaohua Wang, Muling Wu, Wenhao Liu, Tianlong Li, Zixuan Ling, Cenyuan Zhang, Xiaoqing Zheng, Xuanjing Huang | Published: 2024-06-16 WatermarkingPrivacy Protection MethodQuantization and Privacy 2024.06.16 2025.05.27 Literature Database
Speed-up of Data Analysis with Kernel Trick in Encrypted Domain Authors: Joon Soo Yoo, Baek Kyung Song, Tae Min Ahn, Ji Won Heo, Ji Won Yoon | Published: 2024-06-14 WatermarkingComputational EfficiencyComputational Complexity 2024.06.14 2025.05.27 Literature Database