Reconstruction of Differentially Private Text Sanitization via Large Language Models Authors: Shuchao Pang, Zhigang Lu, Haichen Wang, Peng Fu, Yongbin Zhou, Minhui Xue | Published: 2024-10-16 | Updated: 2025-09-18 Privacy AnalysisPrompt InjectionPrompt leaking 2024.10.16 2025.09.20 Literature Database
Data Reconstruction Attacks and Defenses: A Systematic Evaluation Authors: Sheng Liu, Zihan Wang, Yuxiao Chen, Qi Lei | Published: 2024-02-13 | Updated: 2025-03-22 Privacy AnalysisModel RobustnessAdversarial attack 2024.02.13 2025.05.27 Literature Database
Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD Authors: Anvith Thudi, Hengrui Jia, Casey Meehan, Ilia Shumailov, Nicolas Papernot | Published: 2023-07-01 | Updated: 2024-07-16 Security AssuranceData ObfuscationPrivacy Analysis 2023.07.01 2025.05.28 Literature Database
Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting Authors: Ana-Maria Cretu, Daniel Jones, Yves-Alexandre de Montjoye, Shruti Tople | Published: 2023-06-08 | Updated: 2024-03-12 Privacy AnalysisMembership InferenceModel Architecture 2023.06.08 2025.05.28 Literature Database
Security and Privacy Problems in Voice Assistant Applications: A Survey Authors: Jingjin Li, Chao chen, Lei Pan, Mostafa Rahimi Azghadi, Hossein Ghodosi, Jun Zhang | Published: 2023-04-19 Backdoor AttackPrivacy AnalysisSpeech Recognition Process 2023.04.19 2025.05.28 Literature Database
A Randomized Approach for Tight Privacy Accounting Authors: Jiachen T. Wang, Saeed Mahloujifar, Tong Wu, Ruoxi Jia, Prateek Mittal | Published: 2023-04-17 | Updated: 2023-11-21 Privacy AnalysisPrivacy TechniqueStatistical Methods 2023.04.17 2025.05.28 Literature Database
Privacy-Preserving Matrix Factorization for Recommendation Systems using Gaussian Mechanism Authors: Sohan Salahuddin Mugdho, Hafiz Imtiaz | Published: 2023-04-11 WatermarkingPrivacy AnalysisPrivacy Technique 2023.04.11 2025.05.28 Literature Database
Multi-step Jailbreaking Privacy Attacks on ChatGPT Authors: Haoran Li, Dadi Guo, Wei Fan, Mingshi Xu, Jie Huang, Fanpu Meng, Yangqiu Song | Published: 2023-04-11 | Updated: 2023-11-01 LLM SecurityPrivacy AnalysisPrompt Injection 2023.04.11 2025.05.28 Literature Database
Does Prompt-Tuning Language Model Ensure Privacy? Authors: Shangyu Xie, Wei Dai, Esha Ghosh, Sambuddha Roy, Dan Schwartz, Kim Laine | Published: 2023-04-07 | Updated: 2023-04-15 Privacy AnalysisPrivacy TechniqueAttack Evaluation 2023.04.07 2025.05.28 Literature Database
On the Query Complexity of Training Data Reconstruction in Private Learning Authors: Prateeti Mukherjee, Satya Lokam | Published: 2023-03-29 | Updated: 2024-01-11 Privacy Protection MethodPrivacy AnalysisPrivacy Assessment 2023.03.29 2025.05.28 Literature Database