FicGCN: Unveiling the Homomorphic Encryption Efficiency from Irregular Graph Convolutional Networks Authors: Zhaoxuan Kan, Husheng Han, Shangyi Shi, Tenghui Hua, Hang Lu, Xiaowei Li, Jianan Mu, Xing Hu | Published: 2025-06-12 ノード最適化手法Privacy Enhancing TechnologyWatermarking Technology 2025.06.12 2025.06.14 Literature Database
Can We Infer Confidential Properties of Training Data from LLMs? Authors: Penguin Huang, Chhavi Yadav, Ruihan Wu, Kamalika Chaudhuri | Published: 2025-06-12 Privacy Enhancing Technology医療診断属性Large Language Model 2025.06.12 2025.06.14 Literature Database
Learning Obfuscations Of LLM Embedding Sequences: Stained Glass Transform Authors: Jay Roberts, Kyle Mylonakis, Sidhartha Roy, Kaan Kale | Published: 2025-06-11 Privacy Enhancing TechnologyDifferential Privacy情報理論的関係 2025.06.11 2025.06.13 Literature Database
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems Authors: Marco Di Gennaro, Giovanni De Lucia, Stefano Longari, Stefano Zanero, Michele Carminati | Published: 2025-06-09 データ再構築攻撃Privacy Enhancing TechnologyMembership Inference 2025.06.09 2025.06.11 Literature Database
JavelinGuard: Low-Cost Transformer Architectures for LLM Security Authors: Yash Datta, Sharath Rajasekar | Published: 2025-06-09 Privacy Enhancing TechnologyPrompt InjectionModel Architecture 2025.06.09 2025.06.11 Literature Database
Generate-then-Verify: Reconstructing Data from Limited Published Statistics Authors: Terrance Liu, Eileen Xiao, Adam Smith, Pratiksha Thaker, Zhiwei Steven Wu | Published: 2025-04-29 | Updated: 2025-06-11 Privacy protection frameworkPrivacy Enhancing Technology整数計画法 2025.04.29 2025.06.13 Literature Database
ProxyGPT: Enabling User Anonymity in LLM Chatbots via (Un)Trustworthy Volunteer Proxies Authors: Dzung Pham, Jade Sheffey, Chau Minh Pham, Amir Houmansadr | Published: 2024-07-11 | Updated: 2025-06-11 Privacy Enhancing TechnologyPrompt InjectionPrompt leaking 2024.07.11 2025.06.13 Literature Database
Secret Collusion among Generative AI Agents: Multi-Agent Deception via Steganography Authors: Sumeet Ramesh Motwani, Mikhail Baranchuk, Martin Strohmeier, Vijay Bolina, Philip H. S. Torr, Lewis Hammond, Christian Schroeder de Witt | Published: 2024-02-12 | Updated: 2025-04-14 Privacy Enhancing TechnologyPrompt leakingDigital Watermarking for Generative AI 2024.02.12 2025.05.27 Literature Database
Privacy-Preserving Graph Machine Learning from Data to Computation: A Survey Authors: Dongqi Fu, Wenxuan Bao, Ross Maciejewski, Hanghang Tong, Jingrui He | Published: 2023-07-10 Privacy Enhancing TechnologyMembership InferenceFederated Learning 2023.07.10 2025.05.28 Literature Database
Differentially private sliced inverse regression in the federated paradigm Authors: Shuaida He, Jiarui Zhang, Xin Chen | Published: 2023-06-10 | Updated: 2023-08-10 Sample ComplexityPrivacy Enhancing TechnologyFederated Learning 2023.06.10 2025.05.28 Literature Database