Privately Learning from Graphs with Applications in Fine-tuning Large Language Models Authors: Haoteng Yin, Rongzhe Wei, Eli Chien, Pan Li | Published: 2024-10-10 Privacy ProtectionPrivacy Protection Method 2024.10.10 2025.05.27 Literature Database
Near Exact Privacy Amplification for Matrix Mechanisms Authors: Christopher A. Choquette-Choo, Arun Ganesh, Saminul Haque, Thomas Steinke, Abhradeep Thakurta | Published: 2024-10-08 | Updated: 2025-03-20 Privacy ProtectionPrivacy Protection Method 2024.10.08 2025.05.27 Literature Database
KnowledgeSG: Privacy-Preserving Synthetic Text Generation with Knowledge Distillation from Server Authors: Wenhao Wang, Xiaoyu Liang, Rui Ye, Jingyi Chai, Siheng Chen, Yanfeng Wang | Published: 2024-10-08 | Updated: 2024-10-10 Privacy ProtectionPrivacy Protection Method 2024.10.08 2025.05.27 Literature Database
SoK: Towards Security and Safety of Edge AI Authors: Tatjana Wingarz, Anne Lauscher, Janick Edinger, Dominik Kaaser, Stefan Schulte, Mathias Fischer | Published: 2024-10-07 BiasPrivacy ProtectionDefense Method 2024.10.07 2025.05.27 Literature Database
A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers Authors: Peng Tang, Xin Li, Yuxin Chen, Weidong Qiu, Haochen Mei, Allison Holmes, Fenghua Li, Shujun Li | Published: 2024-10-07 Privacy ProtectionPrivacy Protection MethodPrivacy Technique 2024.10.07 2025.05.27 Literature Database
Federated Learning Nodes Can Reconstruct Peers’ Image Data Authors: Ethan Wilson, Kai Yue, Chau-Wai Wong, Huaiyu Dai | Published: 2024-10-07 Privacy ProtectionPoisoning 2024.10.07 2025.05.27 Literature Database
DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech Authors: Dominika Woszczyk, Soteris Demetriou | Published: 2024-10-05 LLM Performance EvaluationPrivacy Protection 2024.10.05 2025.05.27 Literature Database
pFedGame — Decentralized Federated Learning using Game Theory in Dynamic Topology Authors: Monik Raj Behera, Suchetana Chakraborty | Published: 2024-10-05 Simulation Result EvaluationPrivacy Protection 2024.10.05 2025.05.27 Literature Database
An Intelligent Quantum Cyber-Security Framework for Healthcare Data Management Authors: Kishu Gupta, Deepika Saxena, Pooja Rani, Jitendra Kumar, Aaisha Makkar, Ashutosh Kumar Singh, Chung-Nan Lee | Published: 2024-10-04 Privacy ProtectionQuantum FrameworkQuantum Cryptography Technology 2024.10.04 2025.05.27 Literature Database
Adaptively Private Next-Token Prediction of Large Language Models Authors: James Flemings, Meisam Razaviyayn, Murali Annavaram | Published: 2024-10-02 Privacy ProtectionPrivacy Protection MethodPrivacy Technique 2024.10.02 2025.05.27 Literature Database