Differentially Private In-Context Learning with Nearest Neighbor Search Authors: Antti Koskela, Tejas Kulkarni, Laith Zumot | Published: 2025-11-06 Privacy ProtectionPrivacy protection frameworkSelection Method 2025.11.06 2025.11.08 Literature Database
Auditing M-LLMs for Privacy Risks: A Synthetic Benchmark and Evaluation Framework Authors: Junhao Li, Jiahao Chen, Zhou Feng, Chunyi Zhou | Published: 2025-11-05 HallucinationPrivacy ViolationPrivacy Protection 2025.11.05 2025.11.07 Literature Database
Design and Optimization of Cloud Native Homomorphic Encryption Workflows for Privacy-Preserving ML Inference Authors: Tejaswini Bollikonda | Published: 2025-10-28 Privacy ProtectionEncryption Technology暗号化環境でのデータ処理 2025.10.28 2025.10.30 Literature Database
SPEAR++: Scaling Gradient Inversion via Sparsely-Used Dictionary Learning Authors: Alexander Bakarsky, Dimitar I. Dimitrov, Maximilian Baader, Martin Vechev | Published: 2025-10-28 Impact of SparsityPrivacy ProtectionEffectiveness Analysis of Defense Methods 2025.10.28 2025.10.30 Literature Database
LLMs can hide text in other text of the same length Authors: Antonio Norelli, Michael Bronstein | Published: 2025-10-22 | Updated: 2025-10-27 Privacy ProtectionPrompt validation教育目的の情報提供 2025.10.22 2025.10.29 Literature Database
SimKey: A Semantically Aware Key Module for Watermarking Language Models Authors: Shingo Kodama, Haya Diwan, Lucas Rosenblatt, R. Teal Witter, Niv Cohen | Published: 2025-10-11 | Updated: 2025-11-03 Privacy ProtectionInformation SecurityGenerative Adversarial Network 2025.10.11 2025.11.05 Literature Database
RepoMark: A Data-Usage Auditing Framework for Code Large Language Models Authors: Wenjie Qu, Yuguang Zhou, Bo Wang, Yuexin Li, Lionel Z. Wang, Jinyuan Jia, Jiaheng Zhang | Published: 2025-08-29 | Updated: 2025-11-03 Privacy ProtectionInformation Flow AnalysisDigital Watermarking for Generative AI 2025.08.29 2025.11.05 Literature Database
CryptPEFT: Efficient and Private Neural Network Inference via Parameter-Efficient Fine-Tuning Authors: Saisai Xia, Wenhao Wang, Zihao Wang, Yuhui Zhang, Yier Jin, Dan Meng, Rui Hou | Published: 2025-08-17 | Updated: 2025-11-06 Backdoor DetectionPrivacy ProtectionDeep Learning Method 2025.08.17 2025.11.08 Literature Database
SoK: Semantic Privacy in Large Language Models Authors: Baihe Ma, Yanna Jiang, Xu Wang, Guangshen Yu, Qin Wang, Caijun Sun, Chen Li, Xuelei Qi, Ying He, Wei Ni, Ren Ping Liu | Published: 2025-06-30 Semantic Information ExtractionPrivacy ProtectionLarge Language Model 2025.06.30 2025.07.02 Literature Database
ZKPROV: A Zero-Knowledge Approach to Dataset Provenance for Large Language Models Authors: Mina Namazi, Alexander Nemecek, Erman Ayday | Published: 2025-06-26 Privacy ProtectionLarge Language ModelWatermarking Technology 2025.06.26 2025.06.28 Literature Database