Privacy Enhancing Technology

SoK: Privacy Risks and Mitigations in Retrieval-Augmented Generation Systems

Authors: Andreea-Elena Bodea, Stephen Meisenbacher, Alexandra Klymenko, Florian Matthes | Published: 2026-01-07
RAG
Poisoning attack on RAG
Privacy Enhancing Technology

Window-based Membership Inference Attacks Against Fine-tuned Large Language Models

Authors: Yuetian Chen, Yuntao Du, Kaiyuan Zhang, Ashish Kundu, Charles Fleming, Bruno Ribeiro, Ninghui Li | Published: 2026-01-06
Ensemble Learning
Privacy Enhancing Technology
Membership Inference

UnPII: Unlearning Personally Identifiable Information with Quantifiable Exposure Risk

Authors: Intae Jeon, Yujeong Kwon, Hyungjoon Koo | Published: 2026-01-05
Data Selection Strategy
Privacy Enhancing Technology
Model Inversion

Differential Privacy for Secure Machine Learning in Healthcare IoT-Cloud Systems

Authors: N Mangala, Murtaza Rangwala, S Aishwarya, B Eswara Reddy, Rajkumar Buyya, KR Venugopal, SS Iyengar, LM Patnaik | Published: 2025-12-11
Detection of Poison Data for Backdoor Attacks
Privacy Enhancing Technology
Differential Privacy

CoSPED: Consistent Soft Prompt Targeted Data Extraction and Defense

Authors: Yang Zhuochen, Fok Kar Wai, Thing Vrizlynn | Published: 2025-10-13
Privacy Enhancing Technology
Improvement of Learning
Defense Mechanism

Secret-Protected Evolution for Differentially Private Synthetic Text Generation

Authors: Tianze Wang, Zhaoyu Chen, Jian Du, Yingtai Xiao, Linjun Zhang, Qiang Yan | Published: 2025-10-13
Data Protection Method
Privacy Enhancing Technology
Defense Mechanism

Quantifying Information Disclosure During Gradient Descent Using Gradient Uniqueness

Authors: Mahmoud Abdelghafar, Maryam Aliakbarpour, Chris Jermaine | Published: 2025-10-13
Privacy Enhancing Technology
Model Protection Methods
情報理論的関係

Measuring Physical-World Privacy Awareness of Large Language Models: An Evaluation Benchmark

Authors: Xinjie Shen, Mufei Li, Pan Li | Published: 2025-09-27 | Updated: 2025-10-13
Hallucination
Privacy Enhancing Technology
倫理的選択評価

FicGCN: Unveiling the Homomorphic Encryption Efficiency from Irregular Graph Convolutional Networks

Authors: Zhaoxuan Kan, Husheng Han, Shangyi Shi, Tenghui Hua, Hang Lu, Xiaowei Li, Jianan Mu, Xing Hu | Published: 2025-06-12
ノード最適化手法
Privacy Enhancing Technology
Watermarking Technology

Can We Infer Confidential Properties of Training Data from LLMs?

Authors: Penguin Huang, Chhavi Yadav, Ruihan Wu, Kamalika Chaudhuri | Published: 2025-06-12
Privacy Enhancing Technology
医療診断属性
Large Language Model