Data-Free Privacy-Preserving for LLMs via Model Inversion and Selective Unlearning Authors: Xinjie Zhou, Zhihui Yang, Lechao Cheng, Sai Wu, Gang Chen | Published: 2026-01-22 LLM活用Privacy ProtectionDifferential Privacy 2026.01.22 2026.01.24 Literature Database
NeuroFilter: Privacy Guardrails for Conversational LLM Agents Authors: Saswat Das, Ferdinando Fioretto | Published: 2026-01-21 Privacy ProtectionPrompt Injectionマルチターン攻撃分析 2026.01.21 2026.01.23 Literature Database
PAC-Private Responses with Adversarial Composition Authors: Xiaochen Zhu, Mayuri Sridhar, Srinivas Devadas | Published: 2026-01-20 Trigger DetectionPrivacy ProtectionDifferential Privacy 2026.01.20 2026.01.22 Literature Database
LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15 RAGPoisoning attack on RAGPrivacy Protection 2026.01.15 2026.01.17 Literature Database
Privacy Enhanced PEFT: Tensor Train Decomposition Improves Privacy Utility Tradeoffs under DP-SGD Authors: Pradip Kunwar, Minh Vu, Maanak Gupta, Manish Bhattarai | Published: 2026-01-15 Privacy ProtectionDifferential PrivacyPerformance Evaluation 2026.01.15 2026.01.17 Literature Database
SoK: Privacy-aware LLM in Healthcare: Threat Model, Privacy Techniques, Challenges and Recommendations Authors: Mohoshin Ara Tahera, Karamveer Singh Sidhu, Shuvalaxmi Dass, Sajal Saha | Published: 2026-01-15 LLM活用Privacy ProtectionDifferential Privacy 2026.01.15 2026.01.17 Literature Database
SoK: Enhancing Cryptographic Collaborative Learning with Differential Privacy Authors: Francesco Capano, Jonas Böhler, Benjamin Weggenmann | Published: 2026-01-14 Privacy ProtectionDifferential PrivacyFederated Learning 2026.01.14 2026.01.16 Literature Database
DNF: Dual-Layer Nested Fingerprinting for Large Language Model Intellectual Property Protection Authors: Zhenhua Xu, Yiran Zhao, Mengting Zhong, Dezhang Kong, Changting Lin, Tong Qiao, Meng Han | Published: 2026-01-13 Fingerprinting MethodPrivacy ProtectionRobustness of Watermarking Techniques 2026.01.13 2026.01.15 Literature Database
Safe-FedLLM: Delving into the Safety of Federated Large Language Models Authors: Mingxiang Tao, Yu Tian, Wenxuan Tu, Yue Yang, Xue Yang, Xiangyan Tang | Published: 2026-01-12 Security AssurancePrivacy ProtectionPrompt Injection 2026.01.12 2026.01.14 Literature Database
Scaling Trust in Quantum Federated Learning: A Multi-Protocol Privacy Design Authors: Dev Gurung, Shiva Raj Pokhrel | Published: 2025-12-03 Privacy ProtectionDifferential PrivacyFederated Learning 2025.12.03 2025.12.05 Literature Database