How Do Semantically Equivalent Code Transformations Impact Membership Inference on LLMs for Code? Authors: Hua Yang, Alejandro Velasco, Thanh Le-Cong, Md Nazmul Haque, Bowen Xu, Denys Poshyvanyk | Published: 2025-12-17 コード変換の因果分析Code ObfuscationPrivacy Analysis 2025.12.17 2025.12.19 Literature Database
An Efficient Gradient-Based Inference Attack for Federated Learning Authors: Pablo Montaña-Fernández, Ines Ortega-Fernandez | Published: 2025-12-17 Privacy AnalysisPerformance EvaluationFederated Learning 2025.12.17 2025.12.19 Literature Database
Secure and Privacy-Preserving Federated Learning for Next-Generation Underground Mine Safety Authors: Mohamed Elmahallawy, Sanjay Madria, Samuel Frimpong | Published: 2025-12-09 Privacy AssurancePrivacy AnalysisFederated Learning 2025.12.09 2025.12.11 Literature Database
PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration Authors: Yi Liu, Weixiang Han, Chengjun Cai, Xingliang Yuan, Cong Wang | Published: 2025-12-09 Backdoor DetectionPrivacy AssurancePrivacy Analysis 2025.12.09 2025.12.11 Literature Database
A Practical Framework for Evaluating Medical AI Security: Reproducible Assessment of Jailbreaking and Privacy Vulnerabilities Across Clinical Specialties Authors: Jinghao Wang, Ping Zhang, Carter Yagemann | Published: 2025-12-09 CybersecurityPrivacy AnalysisClinical Research 2025.12.09 2025.12.11 Literature Database
Understanding Privacy Risks in Code Models Through Training Dynamics: A Causal Approach Authors: Hua Yang, Alejandro Velasco, Sen Fang, Bowen Xu, Denys Poshyvanyk | Published: 2025-12-08 Indirect Prompt InjectionPrivacy Analysis因果推論 2025.12.08 2025.12.10 Literature Database
Privacy Practices of Browser Agents Authors: Alisha Ukani, Hamed Haddadi, Ali Shahin Shamsabadi, Peter Snyder | Published: 2025-12-08 Indirect Prompt InjectionPrivacy AnalysisInformation Security 2025.12.08 2025.12.10 Literature Database
Amulet: Fast TEE-Shielded Inference for On-Device Model Protection Authors: Zikai Mao, Lingchen Zhao, Lei Xu, Wentao Dong, Shenyi Zhang, Cong Wang, Qian Wang | Published: 2025-12-08 CybersecurityPrivacy AnalysisModel DoS 2025.12.08 2025.12.10 Literature Database
GUIDE: Enhancing Gradient Inversion Attacks in Federated Learning with Denoising Models Authors: Vincenzo Carletti, Pasquale Foggia, Carlo Mazzocca, Giuseppe Parrella, Mario Vento | Published: 2025-10-20 Privacy AnalysisReconstruction AttackFederated Learning 2025.10.20 2025.10.22 Literature Database
Synth-MIA: A Testbed for Auditing Privacy Leakage in Tabular Data Synthesis Authors: Joshua Ward, Xiaofeng Lin, Chi-Hua Wang, Guang Cheng | Published: 2025-09-22 Privacy AnalysisMembership InferenceDifferential Privacy 2025.09.22 2025.09.24 Literature Database