Initial Exploration of Zero-Shot Privacy Utility Tradeoffs in Tabular Data Using GPT-4 Authors: Bishwas Mandal, George Amariucai, Shuangqing Wei | Published: 2024-04-07 Data Privacy AssessmentPrivacy Protection MethodPrompt Injection 2024.04.07 2025.05.27 Literature Database
Advances in Differential Privacy and Differentially Private Machine Learning Authors: Saswat Das, Subhankar Mishra | Published: 2024-04-06 WatermarkingData Privacy AssessmentPrivacy Protection Method 2024.04.06 2025.05.27 Literature Database
Prompt Public Large Language Models to Synthesize Data for Private On-device Applications Authors: Shanshan Wu, Zheng Xu, Yanxiang Zhang, Yuanbo Zhang, Daniel Ramage | Published: 2024-04-05 | Updated: 2024-08-07 Dataset GenerationPrivacy Protection MethodFederated Learning 2024.04.05 2025.05.27 Literature Database
AAA: an Adaptive Mechanism for Locally Differential Private Mean Estimation Authors: Fei Wei, Ergute Bao, Xiaokui Xiao, Yin Yang, Bolin Ding | Published: 2024-04-02 | Updated: 2024-04-03 WatermarkingPrivacy Protection MethodOptimization Problem 2024.04.02 2025.05.27 Literature Database
Can LLMs get help from other LLMs without revealing private information? Authors: Florian Hartmann, Duc-Hieu Tran, Peter Kairouz, Victor Cărbune, Blaise Aguera y Arcas | Published: 2024-04-01 | Updated: 2024-04-02 LLM SecurityPrivacy ProtectionPrivacy Protection Method 2024.04.01 2025.05.27 Literature Database
Deciphering the Interplay between Local Differential Privacy, Average Bayesian Privacy, and Maximum Bayesian Privacy Authors: Xiaojin Zhang, Yulin Fei, Wei Chen | Published: 2024-03-25 | Updated: 2024-04-02 WatermarkingPrivacy Protection MethodPrivacy Classification 2024.03.25 2025.05.27 Literature Database
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption Authors: Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu | Published: 2024-03-17 Training ProtocolPrivacy Protection MethodFederated Learning 2024.03.17 2025.05.27 Literature Database
Interactive Trimming against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach Authors: Yue Fu, Qingqing Ye, Rong Du, Haibo Hu | Published: 2024-03-15 Backdoor AttackPrivacy Protection MethodStrategic Game 2024.03.15 2025.05.27 Literature Database
SoK: Reducing the Vulnerability of Fine-tuned Language Models to Membership Inference Attacks Authors: Guy Amit, Abigail Goldsteen, Ariel Farkash | Published: 2024-03-13 Privacy Protection MethodMembership InferenceModel Performance Evaluation 2024.03.13 2025.05.27 Literature Database
A Framework for Cost-Effective and Self-Adaptive LLM Shaking and Recovery Mechanism Authors: Zhiyu Chen, Yu Li, Suochao Zhang, Jingbo Zhou, Jiwen Zhou, Chenfu Bao, Dianhai Yu | Published: 2024-03-12 WatermarkingPrivacy Protection MethodFramework 2024.03.12 2025.05.27 Literature Database