Learning Obfuscations Of LLM Embedding Sequences: Stained Glass Transform Authors: Jay Roberts, Kyle Mylonakis, Sidhartha Roy, Kaan Kale | Published: 2025-06-11 Privacy Enhancing TechnologyDifferential Privacy情報理論的関係 2025.06.11 2025.06.13 Literature Database
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems Authors: Marco Di Gennaro, Giovanni De Lucia, Stefano Longari, Stefano Zanero, Michele Carminati | Published: 2025-06-09 データ再構築攻撃Privacy Enhancing TechnologyMembership Inference 2025.06.09 2025.06.11 Literature Database
JavelinGuard: Low-Cost Transformer Architectures for LLM Security Authors: Yash Datta, Sharath Rajasekar | Published: 2025-06-09 Privacy Enhancing TechnologyPrompt InjectionModel Architecture 2025.06.09 2025.06.11 Literature Database
Generate-then-Verify: Reconstructing Data from Limited Published Statistics Authors: Terrance Liu, Eileen Xiao, Adam Smith, Pratiksha Thaker, Zhiwei Steven Wu | Published: 2025-04-29 | Updated: 2025-06-11 Privacy protection frameworkPrivacy Enhancing Technology整数計画法 2025.04.29 2025.06.13 Literature Database
When Machine Unlearning Meets Retrieval-Augmented Generation (RAG): Keep Secret or Forget Knowledge? Authors: Shang Wang, Tianqing Zhu, Dayong Ye, Wanlei Zhou | Published: 2024-10-20 | Updated: 2025-10-13 RAGPoisoning attack on RAGPrivacy Enhancing Technology 2024.10.20 2025.10.15 Literature Database
ProxyGPT: Enabling User Anonymity in LLM Chatbots via (Un)Trustworthy Volunteer Proxies Authors: Dzung Pham, Jade Sheffey, Chau Minh Pham, Amir Houmansadr | Published: 2024-07-11 | Updated: 2025-06-11 Privacy Enhancing TechnologyPrompt InjectionPrompt leaking 2024.07.11 2025.06.13 Literature Database
Cross-Modal Safety Alignment: Is textual unlearning all you need? Authors: Trishna Chakraborty, Erfan Shayegani, Zikui Cai, Nael Abu-Ghazaleh, M. Salman Asif, Yue Dong, Amit K. Roy-Chowdhury, Chengyu Song | Published: 2024-05-27 | Updated: 2025-10-14 Privacy Enhancing TechnologyCalculation of Output HarmfulnessLarge Language Model 2024.05.27 2025.10.16 Literature Database
Secret Collusion among Generative AI Agents: Multi-Agent Deception via Steganography Authors: Sumeet Ramesh Motwani, Mikhail Baranchuk, Martin Strohmeier, Vijay Bolina, Philip H. S. Torr, Lewis Hammond, Christian Schroeder de Witt | Published: 2024-02-12 | Updated: 2025-04-14 Privacy Enhancing TechnologyPrompt leakingDigital Watermarking for Generative AI 2024.02.12 2025.05.27 Literature Database
Privacy-Preserving Graph Machine Learning from Data to Computation: A Survey Authors: Dongqi Fu, Wenxuan Bao, Ross Maciejewski, Hanghang Tong, Jingrui He | Published: 2023-07-10 Privacy Enhancing TechnologyMembership InferenceFederated Learning 2023.07.10 2025.05.28 Literature Database
Differentially private sliced inverse regression in the federated paradigm Authors: Shuaida He, Jiarui Zhang, Xin Chen | Published: 2023-06-10 | Updated: 2023-08-10 Sample ComplexityPrivacy Enhancing TechnologyFederated Learning 2023.06.10 2025.05.28 Literature Database