Why Does Differential Privacy with Large Epsilon Defend Against Practical Membership Inference Attacks? Authors: Andrew Lowy, Zhuohang Li, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang | Published: 2024-02-14 Privacy ProtectionPrivacy Protection MethodMembership Inference 2024.02.14 2025.05.27 Literature Database
Auditing Private Prediction Authors: Karan Chadha, Matthew Jagielski, Nicolas Papernot, Christopher Choquette-Choo, Milad Nasr | Published: 2024-02-14 Data Privacy AssessmentPrivacy Protection MethodMembership Inference 2024.02.14 2025.05.27 Literature Database
I can’t see it but I can Fine-tune it: On Encrypted Fine-tuning of Transformers using Fully Homomorphic Encryption Authors: Prajwal Panzade, Daniel Takabi, Zhipeng Cai | Published: 2024-02-14 WatermarkingPrivacy ProtectionPrivacy Protection Method 2024.02.14 2025.05.27 Literature Database
Differentially Private Training of Mixture of Experts Models Authors: Pierre Tholoniat, Huseyin A. Inan, Janardhan Kulkarni, Robert Sim | Published: 2024-02-11 LLM Performance EvaluationPrivacy Protection MethodModel Performance Evaluation 2024.02.11 2025.05.27 Literature Database
Systematic Assessment of Tabular Data Synthesis Algorithms Authors: Yuntao Du, Ninghui Li | Published: 2024-02-09 | Updated: 2024-04-13 Data Privacy AssessmentData GenerationPrivacy Protection Method 2024.02.09 2025.05.27 Literature Database
RQP-SGD: Differential Private Machine Learning through Noisy SGD and Randomized Quantization Authors: Ce Feng, Parv Venkitasubramaniam | Published: 2024-02-09 WatermarkingPrivacy Protection MethodQuantization and Privacy 2024.02.09 2025.05.27 Literature Database
EmojiPrompt: Generative Prompt Obfuscation for Privacy-Preserving Communication with Cloud-based LLMs Authors: Sam Lin, Wenyue Hua, Zhenting Wang, Mingyu Jin, Lizhou Fan, Yongfeng Zhang | Published: 2024-02-08 | Updated: 2025-03-20 WatermarkingPrivacy Protection MethodPrompt Injection 2024.02.08 2025.05.27 Literature Database
A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective Authors: Lei Yu, Meng Han, Yiming Li, Changting Lin, Yao Zhang, Mingyang Zhang, Yan Liu, Haiqin Weng, Yuseok Jeon, Ka-Ho Chow, Stacy Patterson | Published: 2024-02-06 Privacy Protection MethodLabel Inference AttackDefense Method 2024.02.06 2025.05.27 Literature Database
Machine Unlearning in Large Language Models Authors: Kongyang Chen, Zixin Wang, Bing Mi, Waixi Liu, Shaowei Wang, Xiaojun Ren, Jiaxing Shen | Published: 2024-02-03 Privacy Protection MethodModel Performance EvaluationCompliance with Ethical Guidelines 2024.02.03 2025.05.27 Literature Database
Integrating Differential Privacy and Contextual Integrity Authors: Sebastian Benthall, Rachel Cummings | Published: 2024-01-28 Integration of CI and DPPrivacy ProtectionPrivacy Protection Method 2024.01.28 2025.05.27 Literature Database