I can’t see it but I can Fine-tune it: On Encrypted Fine-tuning of Transformers using Fully Homomorphic Encryption Authors: Prajwal Panzade, Daniel Takabi, Zhipeng Cai | Published: 2024-02-14 WatermarkingPrivacy ProtectionPrivacy Protection Method 2024.02.14 2025.05.27 Literature Database
Differentially Private Training of Mixture of Experts Models Authors: Pierre Tholoniat, Huseyin A. Inan, Janardhan Kulkarni, Robert Sim | Published: 2024-02-11 LLM Performance EvaluationPrivacy Protection MethodModel Performance Evaluation 2024.02.11 2025.05.27 Literature Database
Systematic Assessment of Tabular Data Synthesis Algorithms Authors: Yuntao Du, Ninghui Li | Published: 2024-02-09 | Updated: 2024-04-13 Data Privacy AssessmentData GenerationPrivacy Protection Method 2024.02.09 2025.05.27 Literature Database
RQP-SGD: Differential Private Machine Learning through Noisy SGD and Randomized Quantization Authors: Ce Feng, Parv Venkitasubramaniam | Published: 2024-02-09 WatermarkingPrivacy Protection MethodQuantization and Privacy 2024.02.09 2025.05.27 Literature Database
EmojiPrompt: Generative Prompt Obfuscation for Privacy-Preserving Communication with Cloud-based LLMs Authors: Sam Lin, Wenyue Hua, Zhenting Wang, Mingyu Jin, Lizhou Fan, Yongfeng Zhang | Published: 2024-02-08 | Updated: 2025-03-20 WatermarkingPrivacy Protection MethodPrompt Injection 2024.02.08 2025.05.27 Literature Database
A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective Authors: Lei Yu, Meng Han, Yiming Li, Changting Lin, Yao Zhang, Mingyang Zhang, Yan Liu, Haiqin Weng, Yuseok Jeon, Ka-Ho Chow, Stacy Patterson | Published: 2024-02-06 Privacy Protection MethodLabel Inference AttackDefense Method 2024.02.06 2025.05.27 Literature Database
Machine Unlearning in Large Language Models Authors: Kongyang Chen, Zixin Wang, Bing Mi, Waixi Liu, Shaowei Wang, Xiaojun Ren, Jiaxing Shen | Published: 2024-02-03 Privacy Protection MethodModel Performance EvaluationCompliance with Ethical Guidelines 2024.02.03 2025.05.27 Literature Database
Integrating Differential Privacy and Contextual Integrity Authors: Sebastian Benthall, Rachel Cummings | Published: 2024-01-28 Integration of CI and DPPrivacy ProtectionPrivacy Protection Method 2024.01.28 2025.05.27 Literature Database
Training Differentially Private Ad Prediction Models with Semi-Sensitive Features Authors: Lynn Chua, Qiliang Cui, Badih Ghazi, Charlie Harrison, Pritish Kamath, Walid Krichene, Ravi Kumar, Pasin Manurangsi, Krishna Giri Narra, Amer Sinha, Avinash Varadarajan, Chiyuan Zhang | Published: 2024-01-26 AlgorithmWatermarkingPrivacy Protection Method 2024.01.26 2025.05.27 Literature Database
GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption Authors: Eugene Frimpong, Khoa Nguyen, Mindaugas Budzys, Tanveer Khan, Antonis Michalas | Published: 2024-01-26 WatermarkingPrivacy ProtectionPrivacy Protection Method 2024.01.26 2025.05.27 Literature Database