Exploring the Robustness of Decentralized Training for Large Language Models Authors: Lin Lu, Chenxi Dai, Wangcheng Tao, Binhang Yuan, Yanan Sun, Pan Zhou | Published: 2023-12-01 Privacy Protection MethodPoisoningPoisoning Attack 2023.12.01 2025.05.28 Literature Database
MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning Authors: Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty | Published: 2023-11-28 Privacy Protection MethodMembership InferenceFederated Learning 2023.11.28 2025.05.28 Literature Database
Automated discovery of trade-off between utility, privacy and fairness in machine learning models Authors: Bogdan Ficiu, Neil D. Lawrence, Andrei Paleyes | Published: 2023-11-27 Trade-off AnalysisPrivacy Protection MethodEvaluation Method 2023.11.27 2025.05.28 Literature Database
DEPN: Detecting and Editing Privacy Neurons in Pretrained Language Models Authors: Xinwei Wu, Junzhuo Li, Minghui Xu, Weilong Dong, Shuangzhi Wu, Chao Bian, Deyi Xiong | Published: 2023-10-31 | Updated: 2023-12-05 Privacy Protection MethodPrivacy TechniqueModel editing techniques 2023.10.31 2025.05.28 Literature Database
Blind quantum machine learning with quantum bipartite correlator Authors: Changhao Li, Boning Li, Omar Amer, Ruslan Shaydulin, Shouvanik Chakrabarti, Guoqing Wang, Haowei Xu, Hao Tang, Isidor Schoch, Niraj Kumar, Charles Lim, Ju Li, Paola Cappellaro, Marco Pistoia | Published: 2023-10-19 Privacy Protection MethodMalicious ClientQuantum Cryptography Technology 2023.10.19 2025.05.28 Literature Database
Privacy Preserving Large Language Models: ChatGPT Case Study Based Vision and Framework Authors: Imdad Ullah, Najm Hassan, Sukhpal Singh Gill, Basem Suleiman, Tariq Ahamed Ahanger, Zawar Shah, Junaid Qadir, Salil S. Kanhere | Published: 2023-10-19 Privacy Protection MethodPrivacy TechniquePrompt Injection 2023.10.19 2025.05.28 Literature Database
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses Authors: Caelin G. Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira | Published: 2023-10-18 Privacy Protection MethodPrivacy TechniqueDefense Method 2023.10.18 2025.05.28 Literature Database
Privacy-Preserving Graph Embedding based on Local Differential Privacy Authors: Zening Li, Rong-Hua Li, Meihao Liao, Fusheng Jin, Guoren Wang | Published: 2023-10-17 | Updated: 2024-08-04 Graph EmbeddingPrivacy Protection MethodPrivacy Technique 2023.10.17 2025.05.28 Literature Database
Private Synthetic Data Meets Ensemble Learning Authors: Haoyuan Sun, Navid Azizan, Akash Srivastava, Hao Wang | Published: 2023-10-15 Data GenerationPrivacy Protection Methodevaluation metrics 2023.10.15 2025.05.28 Literature Database
DPZero: Private Fine-Tuning of Language Models without Backpropagation Authors: Liang Zhang, Bingcong Li, Kiran Koshy Thekumparampil, Sewoong Oh, Niao He | Published: 2023-10-14 | Updated: 2024-06-06 Privacy ProtectionPrivacy Protection MethodOptimization Methods 2023.10.14 2025.05.28 Literature Database