A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning Authors: Padmaksha Roy, Jaganmohan Chandrasekaran, Erin Lanus, Laura Freeman, Jeremy Werner | Published: 2023-10-06 | Updated: 2023-12-04 Data Protection MethodPrivacy Protection MethodPoisoning 2023.10.06 2025.05.28 Literature Database
Privacy-Preserving In-Context Learning with Differentially Private Few-Shot Generation Authors: Xinyu Tang, Richard Shin, Huseyin A. Inan, Andre Manoel, Fatemehsadat Mireshghallah, Zinan Lin, Sivakanth Gopi, Janardhan Kulkarni, Robert Sim | Published: 2023-09-21 | Updated: 2024-01-28 Data Protection MethodData GenerationPrivacy Technique 2023.09.21 2025.05.28 Literature Database
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services Authors: Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue | Published: 2023-09-15 | Updated: 2024-01-15 Data Protection MethodPrivacy TechniqueOverfitting and Memorization 2023.09.15 2025.05.28 Literature Database
Recovering from Privacy-Preserving Masking with Large Language Models Authors: Arpita Vats, Zhe Liu, Peng Su, Debjyoti Paul, Yingyi Ma, Yutong Pang, Zeeshan Ahmed, Ozlem Kalinli | Published: 2023-09-12 | Updated: 2023-12-14 LLM Performance EvaluationData Protection MethodPrivacy Technique 2023.09.12 2025.05.28 Literature Database
Towards Code Watermarking with Dual-Channel Transformations Authors: Borui Yang, Wei Li, Liyao Xiang, Bo Li | Published: 2023-09-02 | Updated: 2024-01-02 Data Protection MethodFeature Selection MethodWatermark Robustness 2023.09.02 2025.05.28 Literature Database
Artificial Intelligence for Web 3.0: A Comprehensive Survey Authors: Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin, Shen | Published: 2023-08-17 Data Protection MethodPrivacy TechniqueDeep Learning Method 2023.08.17 2025.05.28 Literature Database
A Survey on Decentralized Federated Learning Authors: Edoardo Gabrielli, Giovanni Pica, Gabriele Tolomei | Published: 2023-08-08 Data Protection MethodIntegration of Blockchain and FLPoisoning 2023.08.08 2025.05.28 Literature Database
Accurate, Explainable, and Private Models: Providing Recourse While Minimizing Training Data Leakage Authors: Catherine Huang, Chelse Swoopes, Christina Xiao, Jiaqi Ma, Himabindu Lakkaraju | Published: 2023-08-08 Data Protection MethodMembership Disclosure RiskMachine Learning Technology 2023.08.08 2025.05.28 Literature Database
Labeling without Seeing? Blind Annotation for Privacy-Preserving Entity Resolution Authors: Yixiang Yao, Weizhao Jin, Srivatsan Ravi | Published: 2023-08-07 WatermarkingData Protection MethodCryptography 2023.08.07 2025.05.28 Literature Database
When Federated Learning meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection Authors: Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux | Published: 2023-08-07 WatermarkingData Protection MethodPoisoning 2023.08.07 2025.05.28 Literature Database