DePrompt: Desensitization and Evaluation of Personal Identifiable Information in Large Language Model Prompts Authors: Xiongtao Sun, Gan Liu, Zhipeng He, Hui Li, Xiaoguang Li | Published: 2024-08-16 LLM SecurityPrivacy Protection MethodPrompt Injection 2024.08.16 2025.05.27 Literature Database
Privacy in Federated Learning Authors: Jaydip Sen, Hetvi Waghela, Sneha Rakshit | Published: 2024-08-12 Privacy ProtectionPrivacy Protection MethodModel Performance Evaluation 2024.08.12 2025.05.27 Literature Database
Lancelot: Towards Efficient and Privacy-Preserving Byzantine-Robust Federated Learning within Fully Homomorphic Encryption Authors: Siyang Jiang, Hao Yang, Qipeng Xie, Chuan Ma, Sen Wang, Guoliang Xing | Published: 2024-08-12 Integration of FL and HEWatermarkingPrivacy Protection Method 2024.08.12 2025.05.27 Literature Database
Fast John Ellipsoid Computation with Differential Privacy Optimization Authors: Jiuxiang Gu, Xiaoyu Li, Yingyu Liang, Zhenmei Shi, Zhao Song, Junwei Yu | Published: 2024-08-12 AlgorithmPrivacy Protection MethodConvergence Guarantee 2024.08.12 2025.05.27 Literature Database
Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum Era Authors: Saleh Darzi, Attila A. Yavuz | Published: 2024-08-08 DoS MitigationPrivacy Protection MethodDefense Method 2024.08.08 2025.05.27 Literature Database
Pre-trained Encoder Inference: Revealing Upstream Encoders In Downstream Machine Learning Services Authors: Shaopeng Fu, Xuexue Sun, Ke Qing, Tianhang Zheng, Di Wang | Published: 2024-08-05 Privacy Protection MethodMembership InferenceAttack Method 2024.08.05 2025.05.27 Literature Database
Privacy-Preserving Hierarchical Model-Distributed Inference Authors: Fatemeh Jafarian Dehkordi, Yasaman Keshtkarjahromi, Hulya Seferoglu | Published: 2024-07-25 | Updated: 2024-09-15 Edge ComputingPrivacy Protection MethodCommunication Efficiency 2024.07.25 2025.05.27 Literature Database
Theoretical Analysis of Privacy Leakage in Trustworthy Federated Learning: A Perspective from Linear Algebra and Optimization Theory Authors: Xiaojin Zhang, Wei Chen | Published: 2024-07-23 Privacy ProtectionPrivacy Protection MethodOptimization Problem 2024.07.23 2025.05.27 Literature Database
Private prediction for large-scale synthetic text generation Authors: Kareem Amin, Alex Bie, Weiwei Kong, Alexey Kurakin, Natalia Ponomareva, Umar Syed, Andreas Terzis, Sergei Vassilvitskii | Published: 2024-07-16 | Updated: 2024-10-09 WatermarkingPrivacy Protection MethodPrompt Injection 2024.07.16 2025.05.27 Literature Database
Explainable Differential Privacy-Hyperdimensional Computing for Balancing Privacy and Transparency in Additive Manufacturing Monitoring Authors: Fardin Jalil Piran, Prathyush P. Poduval, Hamza Errahmouni Barkam, Mohsen Imani, Farhad Imani | Published: 2024-07-09 | Updated: 2025-03-17 Privacy Protection MethodPrivacy Design PrinciplesDifferential Privacy 2024.07.09 2025.05.27 Literature Database