What If, But Privately: Private Counterfactual Retrieval Authors: Shreya Meel, Mohamed Nomeir, Pasan Dissanayake, Sanghamitra Dutta, Sennur Ulukus | Published: 2025-08-05 Privacy Protection MethodComputational Complexity通信セキュリティ 2025.08.05 2025.08.07 Literature Database
SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks Authors: Kaiyuan Zhang, Siyuan Cheng, Hanxi Guo, Yuetian Chen, Zian Su, Shengwei An, Yuntao Du, Charles Fleming, Ashish Kundu, Xiangyu Zhang, Ninghui Li | Published: 2025-06-12 Privacy Protection MethodPrompt InjectionPrompt leaking 2025.06.12 2025.06.14 Literature Database
Prada: Black-Box LLM Adaptation with Private Data on Resource-Constrained Devices Authors: Ziyao Wang, Yexiao He, Zheyu Shen, Yu Li, Guoheng Sun, Myungjin Lee, Ang Li | Published: 2025-03-19 Privacy Protection MethodPrompt leakingDeep Learning 2025.03.19 2025.05.27 Literature Database
Zero-Knowledge Proof-Based Consensus for Blockchain-Secured Federated Learning Authors: Tianxing Fu, Jia Hu, Geyong Min, Zi Wang | Published: 2025-03-17 Privacy Protection MethodEfficient Proof SystemDeep Learning 2025.03.17 2025.05.27 Literature Database
VeriLeaky: Navigating IP Protection vs Utility in Fine-Tuning for LLM-Driven Verilog Coding Authors: Zeng Wang, Minghao Shao, Mohammed Nabeel, Prithwish Basu Roy, Likhitha Mankali, Jitendra Bhandari, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel | Published: 2025-03-17 | Updated: 2025-04-14 Data Protection MethodPrivacy Protection MethodPrompt leaking 2025.03.17 2025.05.27 Literature Database
Research on Large Language Model Cross-Cloud Privacy Protection and Collaborative Training based on Federated Learning Authors: Ze Yang, Yihong Jin, Yihan Zhang, Juntian Liu, Xinhe Xu | Published: 2025-03-15 Indirect Prompt InjectionData Protection MethodPrivacy Protection Method 2025.03.15 2025.05.27 Literature Database
Split-n-Chain: Privacy-Preserving Multi-Node Split Learning with Blockchain-Based Auditability Authors: Mukesh Sahani, Binanda Sengupta | Published: 2025-03-10 | Updated: 2025-04-15 Performance EvaluationPrivacy Protection MethodDistributed Learning 2025.03.10 2025.05.27 Literature Database
Secure On-Device Video OOD Detection Without Backpropagation Authors: Shawn Li, Peilin Cai, Yuxiao Zhou, Zhiyu Ni, Renjie Liang, You Qin, Yi Nian, Zhengzhong Tu, Xiyang Hu, Yue Zhao | Published: 2025-03-08 | Updated: 2025-03-17 Privacy Protection MethodFrameworkDeep Learning 2025.03.08 2025.05.27 Literature Database
A hierarchical approach for assessing the vulnerability of tree-based classification models to membership inference attack Authors: Richard J. Preen, Jim Smith | Published: 2025-02-13 | Updated: 2025-06-12 Privacy Protection MethodModel Extraction AttackRisk Assessment 2025.02.13 2025.06.14 Literature Database
Privacy-Preserving Dynamic Assortment Selection Authors: Young Hyun Cho, Will Wei Sun | Published: 2024-10-29 Privacy ProtectionPrivacy Protection MethodOptimization Problem 2024.10.29 2025.05.27 Literature Database