Data Leakage

Agent Tools Orchestration Leaks More: Dataset, Benchmark, and Mitigation

Authors: Yuxuan Qiao, Dongqin Liu, Hongchang Yang, Wei Zhou, Songlin Hu | Published: 2025-12-18
Data Leakage
Privacy-Preserving Machine Learning
Watermark

ContextLeak: Auditing Leakage in Private In-Context Learning Methods

Authors: Jacob Choi, Shuying Cao, Xingjian Dong, Wang Bill Zhu, Robin Jia, Sai Praneeth Karimireddy | Published: 2025-12-18
Data Leakage
Privacy-Preserving Machine Learning
Prompt leaking

Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on the MCP Ecosystem

Authors: Shuli Zhao, Qinsheng Hou, Zihan Zhan, Yanhao Wang, Yuchong Xie, Yu Guo, Libo Chen, Shenghong Li, Zhi Xue | Published: 2025-09-08
Data Leakage
Privacy Management
Vulnerability Management

Traces of Memorisation in Large Language Models for Code

Authors: Ali Al-Kaswan, Maliheh Izadi, Arie van Deursen | Published: 2023-12-18 | Updated: 2024-01-15
Dataset Generation
Data Leakage
Training Data Extraction Method

Scalable Extraction of Training Data from (Production) Language Models

Authors: Milad Nasr, Nicholas Carlini, Jonathan Hayase, Matthew Jagielski, A. Feder Cooper, Daphne Ippolito, Christopher A. Choquette-Choo, Eric Wallace, Florian Tramèr, Katherine Lee | Published: 2023-11-28
Data Leakage
Training Data Extraction Method
Prompt Injection

Security Challenges for Cloud or Fog Computing-Based AI Applications

Authors: Amir Pakmehr, Andreas Aßmuth, Christoph P. Neumann, Gerald Pirkl | Published: 2023-10-30 | Updated: 2023-12-20
Edge Computing
Security Analysis
Data Leakage

In-Context Unlearning: Language Models as Few Shot Unlearners

Authors: Martin Pawelczyk, Seth Neel, Himabindu Lakkaraju | Published: 2023-10-11 | Updated: 2024-06-06
Data Leakage
Performance Evaluation
Machine Learning Technology

“It’s a Fair Game”, or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents

Authors: Zhiping Zhang, Michelle Jia, Hao-Ping Lee, Bingsheng Yao, Sauvik Das, Ada Lerner, Dakuo Wang, Tianshi Li | Published: 2023-09-20 | Updated: 2024-04-02
Data Leakage
Privacy Technique
User Education

What can we learn from Data Leakage and Unlearning for Law?

Authors: Jaydeep Borkar | Published: 2023-07-19
Data Leakage
Measurement of Memorization
Watermark Evaluation

MasterKey: Automated Jailbreak Across Multiple Large Language Model Chatbots

Authors: Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu | Published: 2023-07-16 | Updated: 2023-10-25
Data Leakage
Prompt Injection
Watermark Robustness