Data Leakage

ProPILE: Probing Privacy Leakage in Large Language Models

Authors: Siwon Kim, Sangdoo Yun, Hwaran Lee, Martin Gubri, Sungroh Yoon, Seong Joon Oh | Published: 2023-07-04
Data Leakage
Privacy Violation
Prompting Strategy

Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction

Authors: Zitao Chen, Karthik Pattabiraman | Published: 2023-07-04
Security Assurance
Data Leakage
Membership Inference

Distribution inference risks: Identifying and mitigating sources of leakage

Authors: Valentin Hartmann, Léo Meynent, Maxime Peyrard, Dimitrios Dimitriadis, Shruti Tople, Robert West | Published: 2022-09-18
Data Leakage
Membership Inference
Causes of Information Leakage

Approximate Data Deletion in Generative Models

Authors: Zhifeng Kong, Scott Alfeld | Published: 2022-06-29
Algorithm Design
Data Leakage
Hypothesis Testing

Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters

Authors: Han Wang | Published: 2021-10-04
Data Leakage
Fingerprinting Method
Performance Evaluation

Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS

Authors: Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert | Published: 2021-09-20 | Updated: 2022-06-08
Algorithm
Cybersecurity
Data Leakage

Formalizing and Estimating Distribution Inference Risks

Authors: Anshuman Suri, David Evans | Published: 2021-09-13 | Updated: 2022-07-05
Data Leakage
Membership Inference
Adversarial Learning

Longitudinal Compliance Analysis of Android Applications with Privacy Policies

Authors: Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith | Published: 2021-06-18 | Updated: 2021-07-28
Data Collection
Data Leakage
Privacy Enhancing Technology

Information Theoretic Evaluation of Privacy-Leakage, Interpretability, and Transferability for Trustworthy AI

Authors: Mohit Kumar, Bernhard A. Moser, Lukas Fischer, Bernhard Freudenthaler | Published: 2021-06-06 | Updated: 2022-04-12
Data Leakage
Privacy Enhancing Technology
Information-Theoretic Evaluation

Machine Learning Interpretability Meets TLS Fingerprinting

Authors: Mahdi Jafari Siavoshani, Amir Hossein Khajepour, Amirmohammad Ziaei, Amir Ali Gatmiri, Ali Taheri | Published: 2020-11-12 | Updated: 2021-09-12
Data Leakage
Model Performance Evaluation
Deep Learning-Based IDS