ProPILE: Probing Privacy Leakage in Large Language Models Authors: Siwon Kim, Sangdoo Yun, Hwaran Lee, Martin Gubri, Sungroh Yoon, Seong Joon Oh | Published: 2023-07-04 Data LeakagePrivacy ViolationPrompting Strategy 2023.07.04 2025.05.28 Literature Database
Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction Authors: Zitao Chen, Karthik Pattabiraman | Published: 2023-07-04 Security AssuranceData LeakageMembership Inference 2023.07.04 2025.05.28 Literature Database
Distribution inference risks: Identifying and mitigating sources of leakage Authors: Valentin Hartmann, Léo Meynent, Maxime Peyrard, Dimitrios Dimitriadis, Shruti Tople, Robert West | Published: 2022-09-18 Data LeakageMembership InferenceCauses of Information Leakage 2022.09.18 2025.05.28 Literature Database
Approximate Data Deletion in Generative Models Authors: Zhifeng Kong, Scott Alfeld | Published: 2022-06-29 Algorithm DesignData LeakageHypothesis Testing 2022.06.29 2025.05.28 Literature Database
Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters Authors: Han Wang | Published: 2021-10-04 Data LeakageFingerprinting MethodPerformance Evaluation 2021.10.04 2025.05.28 Literature Database
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS Authors: Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert | Published: 2021-09-20 | Updated: 2022-06-08 AlgorithmCybersecurityData Leakage 2021.09.20 2025.05.28 Literature Database
Formalizing and Estimating Distribution Inference Risks Authors: Anshuman Suri, David Evans | Published: 2021-09-13 | Updated: 2022-07-05 Data LeakageMembership InferenceAdversarial Learning 2021.09.13 2025.05.28 Literature Database
Longitudinal Compliance Analysis of Android Applications with Privacy Policies Authors: Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith | Published: 2021-06-18 | Updated: 2021-07-28 Data CollectionData LeakagePrivacy Enhancing Technology 2021.06.18 2025.05.28 Literature Database
Information Theoretic Evaluation of Privacy-Leakage, Interpretability, and Transferability for Trustworthy AI Authors: Mohit Kumar, Bernhard A. Moser, Lukas Fischer, Bernhard Freudenthaler | Published: 2021-06-06 | Updated: 2022-04-12 Data LeakagePrivacy Enhancing TechnologyInformation-Theoretic Evaluation 2021.06.06 2025.05.28 Literature Database
Machine Learning Interpretability Meets TLS Fingerprinting Authors: Mahdi Jafari Siavoshani, Amir Hossein Khajepour, Amirmohammad Ziaei, Amir Ali Gatmiri, Ali Taheri | Published: 2020-11-12 | Updated: 2021-09-12 Data LeakageModel Performance EvaluationDeep Learning-Based IDS 2020.11.12 2025.05.28 Literature Database