When Machine Unlearning Meets Retrieval-Augmented Generation (RAG): Keep Secret or Forget Knowledge? Authors: Shang Wang, Tianqing Zhu, Dayong Ye, Wanlei Zhou | Published: 2024-10-20 | Updated: 2025-10-13 RAGPoisoning attack on RAGPrivacy Enhancing Technology 2024.10.20 2025.10.15 Literature Database
ProxyGPT: Enabling User Anonymity in LLM Chatbots via (Un)Trustworthy Volunteer Proxies Authors: Dzung Pham, Jade Sheffey, Chau Minh Pham, Amir Houmansadr | Published: 2024-07-11 | Updated: 2025-06-11 Privacy Enhancing TechnologyPrompt InjectionPrompt leaking 2024.07.11 2025.06.13 Literature Database
Cross-Modal Safety Alignment: Is textual unlearning all you need? Authors: Trishna Chakraborty, Erfan Shayegani, Zikui Cai, Nael Abu-Ghazaleh, M. Salman Asif, Yue Dong, Amit K. Roy-Chowdhury, Chengyu Song | Published: 2024-05-27 | Updated: 2025-10-14 Privacy Enhancing TechnologyCalculation of Output HarmfulnessLarge Language Model 2024.05.27 2025.10.16 Literature Database
Secret Collusion among Generative AI Agents: Multi-Agent Deception via Steganography Authors: Sumeet Ramesh Motwani, Mikhail Baranchuk, Martin Strohmeier, Vijay Bolina, Philip H. S. Torr, Lewis Hammond, Christian Schroeder de Witt | Published: 2024-02-12 | Updated: 2025-04-14 Privacy Enhancing TechnologyPrompt leakingDigital Watermarking for Generative AI 2024.02.12 2025.05.27 Literature Database
Privacy-Preserving Graph Machine Learning from Data to Computation: A Survey Authors: Dongqi Fu, Wenxuan Bao, Ross Maciejewski, Hanghang Tong, Jingrui He | Published: 2023-07-10 Privacy Enhancing TechnologyMembership InferenceFederated Learning 2023.07.10 2025.05.28 Literature Database
Differentially private sliced inverse regression in the federated paradigm Authors: Shuaida He, Jiarui Zhang, Xin Chen | Published: 2023-06-10 | Updated: 2023-08-10 Sample ComplexityPrivacy Enhancing TechnologyFederated Learning 2023.06.10 2025.05.28 Literature Database
Differentially Private Selection from Secure Distributed Computing Authors: Ivan Damgård, Hannah Keller, Boel Nelson, Claudio Orlandi, Rasmus Pagh | Published: 2023-06-07 | Updated: 2023-06-08 MPC AlgorithmScalability AnalysisPrivacy Enhancing Technology 2023.06.07 2025.05.28 Literature Database
Human-imperceptible, Machine-recognizable Images Authors: Fusheng Hao, Fengxiang He, Yikai Wang, Fuxiang Wu, Jing Zhang, Jun Cheng, Dacheng Tao | Published: 2023-06-06 WatermarkingPrivacy Enhancing TechnologyModel Design and Accuracy 2023.06.06 2025.05.28 Literature Database
A Privacy-Preserving Federated Learning Approach for Kernel methods Authors: Anika Hannemann, Ali Burak Ünal, Arjhun Swaminathan, Erik Buchmann, Mete Akgün | Published: 2023-06-05 MPC AlgorithmPrivacy Enhancing TechnologyWatermark Evaluation 2023.06.05 2025.05.28 Literature Database
FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking Authors: Junchuan Liang, Rong Wang | Published: 2023-06-02 Privacy Enhancing TechnologyIntellectual Property ProtectionWatermark Evaluation 2023.06.02 2025.05.28 Literature Database