Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption Authors: Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu | Published: 2024-03-17 Training ProtocolPrivacy Protection MethodFederated Learning 2024.03.17 2025.05.27 Literature Database
Interactive Trimming against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach Authors: Yue Fu, Qingqing Ye, Rong Du, Haibo Hu | Published: 2024-03-15 Backdoor AttackPrivacy Protection MethodStrategic Game 2024.03.15 2025.05.27 Literature Database
SoK: Reducing the Vulnerability of Fine-tuned Language Models to Membership Inference Attacks Authors: Guy Amit, Abigail Goldsteen, Ariel Farkash | Published: 2024-03-13 Privacy Protection MethodMembership InferenceModel Performance Evaluation 2024.03.13 2025.05.27 Literature Database
A Framework for Cost-Effective and Self-Adaptive LLM Shaking and Recovery Mechanism Authors: Zhiyu Chen, Yu Li, Suochao Zhang, Jingbo Zhou, Jiwen Zhou, Chenfu Bao, Dianhai Yu | Published: 2024-03-12 WatermarkingPrivacy Protection MethodFramework 2024.03.12 2025.05.27 Literature Database
DP-TabICL: In-Context Learning with Differentially Private Tabular Data Authors: Alycia N. Carey, Karuna Bhaila, Kennedy Edemacu, Xintao Wu | Published: 2024-03-08 Few-Shot LearningPrivacy Protection MethodPrompt Injection 2024.03.08 2025.05.27 Literature Database
On Protecting the Data Privacy of Large Language Models (LLMs): A Survey Authors: Biwei Yan, Kun Li, Minghui Xu, Yueyan Dong, Yue Zhang, Zhaochun Ren, Xiuzhen Cheng | Published: 2024-03-08 | Updated: 2024-03-14 Backdoor AttackPrivacy Protection MethodPrompt Injection 2024.03.08 2025.05.27 Literature Database
Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training Authors: Tanveer Khan, Mindaugas Budzys, Khoa Nguyen, Antonis Michalas | Published: 2024-03-06 Privacy ProtectionPrivacy Protection MethodMulti-Party Computation 2024.03.06 2025.05.27 Literature Database
Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks Authors: Sayedeh Leila Noorbakhsh, Binghui Zhang, Yuan Hong, Binghui Wang | Published: 2024-03-04 Privacy Protection MethodPrompt InjectionMembership Inference 2024.03.04 2025.05.27 Literature Database
Analysis of Privacy Leakage in Federated Large Language Models Authors: Minh N. Vu, Truc Nguyen, Tre' R. Jeter, My T. Thai | Published: 2024-03-02 Privacy Protection MethodPoisoningFederated Learning 2024.03.02 2025.05.27 Literature Database
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach Authors: Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu | Published: 2024-03-02 Privacy Protection MethodPoisoningFederated Learning 2024.03.02 2025.05.27 Literature Database