No Prior, No Leakage: Revisiting Reconstruction Attacks in Trained Neural Networks Authors: Yehonatan Refael, Guy Smorodinsky, Ofir Lindenbaum, Itay Safran | Published: 2025-09-25 Training Data GenerationPrivacy Protection MechanismPrivacy Protection Method 2025.09.25 2025.09.27 Literature Database
Understanding the Error Sensitivity of Privacy-Aware Computing Authors: Matías Mazzanti, Esteban Mocskos, Augusto Vega, Pradip Bose | Published: 2025-06-09 Error Correction CodePrivacy Protection MechanismEncryption Technology 2025.06.09 2025.06.11 Literature Database
Secure Distributed Learning for CAVs: Defending Against Gradient Leakage with Leveled Homomorphic Encryption Authors: Muhammad Ali Najjar, Ren-Yi Huang, Dumindu Samaraweera, Prashant Shekhar | Published: 2025-06-09 Privacy Protection MechanismEncryption TechnologyFederated Learning 2025.06.09 2025.06.11 Literature Database
Progent: Programmable Privilege Control for LLM Agents Authors: Tianneng Shi, Jingxuan He, Zhun Wang, Linyu Wu, Hongwei Li, Wenbo Guo, Dawn Song | Published: 2025-04-16 LLM Performance EvaluationIndirect Prompt InjectionPrivacy Protection Mechanism 2025.04.16 2025.05.27 Literature Database
The Obvious Invisible Threat: LLM-Powered GUI Agents’ Vulnerability to Fine-Print Injections Authors: Chaoran Chen, Zhiping Zhang, Bingcan Guo, Shang Ma, Ibrahim Khalilov, Simret A Gebreegziabher, Yanfang Ye, Ziang Xiao, Yaxing Yao, Tianshi Li, Toby Jia-Jun Li | Published: 2025-04-15 Indirect Prompt InjectionPrivacy Protection MechanismUser Behavior Analysis 2025.04.15 2025.05.27 Literature Database
Nearly Optimal Differentially Private ReLU Regression Authors: Meng Ding, Mingxi Lei, Shaowei Wang, Tianhang Zheng, Di Wang, Jinhui Xu | Published: 2025-03-08 | Updated: 2025-06-10 Privacy Protection MechanismConvergence PropertyDifferential Privacy 2025.03.08 2025.06.12 Literature Database
“You Can’t Fix What You Can’t Measure”: Privately Measuring Demographic Performance Disparities in Federated Learning Authors: Marc Juarez, Aleksandra Korolova | Published: 2022-06-24 | Updated: 2023-01-11 Algorithm DesignPerformance EvaluationPrivacy Protection Mechanism 2022.06.24 2025.05.28 Literature Database
User-Level Differential Privacy against Attribute Inference Attack of Speech Emotion Recognition in Federated Learning Authors: Tiantian Feng, Raghuveer Peri, Shrikanth Narayanan | Published: 2022-04-05 | Updated: 2022-05-17 Privacy Protection MechanismPrivacy Enhancing TechnologyPrivacy Assessment 2022.04.05 2025.05.28 Literature Database
Differentially Private Sampling from Rashomon Sets, and the Universality of Langevin Diffusion for Convex Optimization Authors: Arun Ganesh, Abhradeep Thakurta, Jalaj Upadhyay | Published: 2022-04-04 | Updated: 2023-08-28 AlgorithmPrivacy Protection MechanismPrivacy Assessment 2022.04.04 2025.05.28 Literature Database
Byzantine-Robust Federated Linear Bandits Authors: Ali Jadbabaie, Haochuan Li, Jian Qian, Yi Tian | Published: 2022-04-03 AlgorithmPrivacy Protection MechanismDistributed Learning 2022.04.03 2025.05.28 Literature Database