Hot PATE: Private Aggregation of Distributions for Diverse Task Authors: Edith Cohen, Benjamin Cohen-Wang, Xin Lyu, Jelani Nelson, Tamas Sarlos, Uri Stemmer | Published: 2023-12-04 | Updated: 2024-05-17 WatermarkingPrivacy Protection MethodComputational Efficiency 2023.12.04 2025.05.28 Literature Database
Exploring the Robustness of Decentralized Training for Large Language Models Authors: Lin Lu, Chenxi Dai, Wangcheng Tao, Binhang Yuan, Yanan Sun, Pan Zhou | Published: 2023-12-01 Privacy Protection MethodPoisoningPoisoning Attack 2023.12.01 2025.05.28 Literature Database
MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning Authors: Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty | Published: 2023-11-28 Privacy Protection MethodMembership InferenceFederated Learning 2023.11.28 2025.05.28 Literature Database
Automated discovery of trade-off between utility, privacy and fairness in machine learning models Authors: Bogdan Ficiu, Neil D. Lawrence, Andrei Paleyes | Published: 2023-11-27 Trade-off AnalysisPrivacy Protection MethodEvaluation Method 2023.11.27 2025.05.28 Literature Database
DEPN: Detecting and Editing Privacy Neurons in Pretrained Language Models Authors: Xinwei Wu, Junzhuo Li, Minghui Xu, Weilong Dong, Shuangzhi Wu, Chao Bian, Deyi Xiong | Published: 2023-10-31 | Updated: 2023-12-05 Privacy Protection MethodPrivacy TechniqueModel editing techniques 2023.10.31 2025.05.28 Literature Database
Blind quantum machine learning with quantum bipartite correlator Authors: Changhao Li, Boning Li, Omar Amer, Ruslan Shaydulin, Shouvanik Chakrabarti, Guoqing Wang, Haowei Xu, Hao Tang, Isidor Schoch, Niraj Kumar, Charles Lim, Ju Li, Paola Cappellaro, Marco Pistoia | Published: 2023-10-19 Privacy Protection MethodMalicious ClientQuantum Cryptography Technology 2023.10.19 2025.05.28 Literature Database
Privacy Preserving Large Language Models: ChatGPT Case Study Based Vision and Framework Authors: Imdad Ullah, Najm Hassan, Sukhpal Singh Gill, Basem Suleiman, Tariq Ahamed Ahanger, Zawar Shah, Junaid Qadir, Salil S. Kanhere | Published: 2023-10-19 Privacy Protection MethodPrivacy TechniquePrompt Injection 2023.10.19 2025.05.28 Literature Database
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses Authors: Caelin G. Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira | Published: 2023-10-18 Privacy Protection MethodPrivacy TechniqueDefense Method 2023.10.18 2025.05.28 Literature Database
Privacy-Preserving Graph Embedding based on Local Differential Privacy Authors: Zening Li, Rong-Hua Li, Meihao Liao, Fusheng Jin, Guoren Wang | Published: 2023-10-17 | Updated: 2024-08-04 Graph EmbeddingPrivacy Protection MethodPrivacy Technique 2023.10.17 2025.05.28 Literature Database
Private Synthetic Data Meets Ensemble Learning Authors: Haoyuan Sun, Navid Azizan, Akash Srivastava, Hao Wang | Published: 2023-10-15 Data GenerationPrivacy Protection Methodevaluation metrics 2023.10.15 2025.05.28 Literature Database