I can’t see it but I can Fine-tune it: On Encrypted Fine-tuning of Transformers using Fully Homomorphic Encryption Authors: Prajwal Panzade, Daniel Takabi, Zhipeng Cai | Published: 2024-02-14 WatermarkingPrivacy ProtectionPrivacy Protection Method 2024.02.14 2025.05.27 Literature Database
Utilizing Large LanguageModels to Detect Privacy Leaks in Mini-App Code Authors: Liming Jiang | Published: 2024-02-12 LLM SecurityData Privacy AssessmentPrivacy Protection 2024.02.12 2025.05.27 Literature Database
MAGNETO: Edge AI for Human Activity Recognition — Privacy and Personalization Authors: Jingwei Zuo, George Arvanitakis, Mthandazo Ndhlovu, Hakim Hacid | Published: 2024-02-11 | Updated: 2024-02-14 Edge ComputingPrivacy ProtectionReal-Time Inference 2024.02.11 2025.05.27 Literature Database
Barycentric and Pairwise Renyi Quantum Leakage Authors: Farhad Farokhi | Published: 2024-02-09 WatermarkingPrivacy ProtectionQuantum Framework 2024.02.09 2025.05.27 Literature Database
De-amplifying Bias from Differential Privacy in Language Model Fine-tuning Authors: Sanjari Srivastava, Piotr Mardziel, Zhikhun Zhang, Archana Ahlawat, Anupam Datta, John C Mitchell | Published: 2024-02-07 Data Privacy AssessmentBiasPrivacy Protection 2024.02.07 2025.05.27 Literature Database
Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT Models Authors: Junjie Chu, Zeyang Sha, Michael Backes, Yang Zhang | Published: 2024-02-05 | Updated: 2024-10-07 Privacy ProtectionPrompt InjectionMalicious Prompt 2024.02.05 2025.05.27 Literature Database
Human-Centered Privacy Research in the Age of Large Language Models Authors: Tianshi Li, Sauvik Das, Hao-Ping Lee, Dakuo Wang, Bingsheng Yao, Zhiping Zhang | Published: 2024-02-03 Privacy ProtectionPrompt InjectionHuman-Centered Approach 2024.02.03 2025.05.27 Literature Database
Position Paper: Assessing Robustness, Privacy, and Fairness in Federated Learning Integrated with Foundation Models Authors: Xi Li, Jiaqi Wang | Published: 2024-02-02 Privacy ProtectionFairness evaluationFederated Learning 2024.02.02 2025.05.27 Literature Database
BrainLeaks: On the Privacy-Preserving Properties of Neuromorphic Architectures against Model Inversion Attacks Authors: Hamed Poursiami, Ihsen Alouani, Maryam Parsa | Published: 2024-02-01 | Updated: 2024-05-07 WatermarkingPrivacy ProtectionMembership Inference 2024.02.01 2025.05.27 Literature Database
Integrating Differential Privacy and Contextual Integrity Authors: Sebastian Benthall, Rachel Cummings | Published: 2024-01-28 Integration of CI and DPPrivacy ProtectionPrivacy Protection Method 2024.01.28 2025.05.27 Literature Database