Optimal Differentially Private Model Training with Public Data Authors: Andrew Lowy, Zeman Li, Tianjian Huang, Meisam Razaviyayn | Published: 2023-06-26 | Updated: 2024-09-09 Privacy Protection MethodOptimization ProblemFederated Learning 2023.06.26 2025.05.28 Literature Database
Adversarial Robustness in Unsupervised Machine Learning: A Systematic Review Authors: Mathias Lundteigen Mohus, Jinyue Li | Published: 2023-06-01 Privacy Protection MethodPoisoningAdversarial Attack Methods 2023.06.01 2025.05.28 Literature Database
A Note On Interpreting Canary Exposure Authors: Matthew Jagielski | Published: 2023-05-31 | Updated: 2023-06-02 Privacy Protection MethodMembership InferenceWatermark Evaluation 2023.05.31 2025.05.28 Literature Database
Inferring Private Personal Attributes of Virtual Reality Users from Head and Hand Motion Data Authors: Vivek Nair, Christian Rack, Wenbo Guo, Rui Wang, Shuixian Li, Brandon Huang, Atticus Cull, James F. O'Brien, Marc Latoschik, Louis Rosenberg, Dawn Song | Published: 2023-05-30 | Updated: 2023-06-10 Sampling MethodPrivacy Protection MethodMachine Learning Method 2023.05.30 2025.05.28 Literature Database
Membership Inference Attacks against Language Models via Neighbourhood Comparison Authors: Justus Mattern, Fatemehsadat Mireshghallah, Zhijing Jin, Bernhard Schölkopf, Mrinmaya Sachan, Taylor Berg-Kirkpatrick | Published: 2023-05-29 | Updated: 2023-08-07 LLM Performance EvaluationPrivacy Protection MethodDefense Method 2023.05.29 2025.05.28 Literature Database
LLMs Can Understand Encrypted Prompt: Towards Privacy-Computing Friendly Transformers Authors: Xuanqi Liu, Zhuotao Liu | Published: 2023-05-28 | Updated: 2023-12-15 DNN IP Protection MethodLLM Performance EvaluationPrivacy Protection Method 2023.05.28 2025.05.28 Literature Database
Improved Privacy-Preserving PCA Using Optimized Homomorphic Matrix Multiplication Authors: Xirong Ma | Published: 2023-05-27 | Updated: 2023-08-17 Privacy Protection MethodConvergence PropertyEncryption Method 2023.05.27 2025.05.28 Literature Database
Evaluating Privacy Leakage in Split Learning Authors: Xinchi Qiu, Ilias Leontiadis, Luca Melis, Alex Sablayrolles, Pierre Stock | Published: 2023-05-22 | Updated: 2024-01-19 Privacy ViolationPrivacy Protection MethodAttack Method 2023.05.22 2025.05.28 Literature Database
Quantifying Association Capabilities of Large Language Models and Its Implications on Privacy Leakage Authors: Hanyin Shao, Jie Huang, Shen Zheng, Kevin Chen-Chuan Chang | Published: 2023-05-22 | Updated: 2024-02-09 LLM Performance EvaluationPrivacy ViolationPrivacy Protection Method 2023.05.22 2025.05.28 Literature Database
In the Name of Fairness: Assessing the Bias in Clinical Record De-identification Authors: Yuxin Xiao, Shulammite Lim, Tom Joseph Pollard, Marzyeh Ghassemi | Published: 2023-05-18 | Updated: 2024-01-03 Privacy Protection MethodFairness evaluationThreats of Medical AI 2023.05.18 2025.05.28 Literature Database