CoSPED: Consistent Soft Prompt Targeted Data Extraction and Defense Authors: Yang Zhuochen, Fok Kar Wai, Thing Vrizlynn | Published: 2025-10-13 Privacy Enhancing TechnologyImprovement of LearningDefense Mechanism 2025.10.13 2025.10.15 Literature Database
Secret-Protected Evolution for Differentially Private Synthetic Text Generation Authors: Tianze Wang, Zhaoyu Chen, Jian Du, Yingtai Xiao, Linjun Zhang, Qiang Yan | Published: 2025-10-13 Data Protection MethodPrivacy Enhancing TechnologyDefense Mechanism 2025.10.13 2025.10.15 Literature Database
Quantifying Information Disclosure During Gradient Descent Using Gradient Uniqueness Authors: Mahmoud Abdelghafar, Maryam Aliakbarpour, Chris Jermaine | Published: 2025-10-13 Privacy Enhancing TechnologyModel Protection Methods情報理論的関係 2025.10.13 2025.10.15 Literature Database
Measuring Physical-World Privacy Awareness of Large Language Models: An Evaluation Benchmark Authors: Xinjie Shen, Mufei Li, Pan Li | Published: 2025-09-27 | Updated: 2025-10-13 HallucinationPrivacy Enhancing Technology倫理的選択評価 2025.09.27 2025.10.15 Literature Database
FicGCN: Unveiling the Homomorphic Encryption Efficiency from Irregular Graph Convolutional Networks Authors: Zhaoxuan Kan, Husheng Han, Shangyi Shi, Tenghui Hua, Hang Lu, Xiaowei Li, Jianan Mu, Xing Hu | Published: 2025-06-12 ノード最適化手法Privacy Enhancing TechnologyWatermarking Technology 2025.06.12 2025.06.14 Literature Database
Can We Infer Confidential Properties of Training Data from LLMs? Authors: Penguin Huang, Chhavi Yadav, Ruihan Wu, Kamalika Chaudhuri | Published: 2025-06-12 Privacy Enhancing Technology医療診断属性Large Language Model 2025.06.12 2025.06.14 Literature Database
Learning Obfuscations Of LLM Embedding Sequences: Stained Glass Transform Authors: Jay Roberts, Kyle Mylonakis, Sidhartha Roy, Kaan Kale | Published: 2025-06-11 Privacy Enhancing TechnologyDifferential Privacy情報理論的関係 2025.06.11 2025.06.13 Literature Database
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems Authors: Marco Di Gennaro, Giovanni De Lucia, Stefano Longari, Stefano Zanero, Michele Carminati | Published: 2025-06-09 データ再構築攻撃Privacy Enhancing TechnologyMembership Inference 2025.06.09 2025.06.11 Literature Database
JavelinGuard: Low-Cost Transformer Architectures for LLM Security Authors: Yash Datta, Sharath Rajasekar | Published: 2025-06-09 Privacy Enhancing TechnologyPrompt InjectionModel Architecture 2025.06.09 2025.06.11 Literature Database
Generate-then-Verify: Reconstructing Data from Limited Published Statistics Authors: Terrance Liu, Eileen Xiao, Adam Smith, Pratiksha Thaker, Zhiwei Steven Wu | Published: 2025-04-29 | Updated: 2025-06-11 Privacy protection frameworkPrivacy Enhancing Technology整数計画法 2025.04.29 2025.06.13 Literature Database