Privacy Leakage

A Critical Review on the Effectiveness and Privacy Threats of Membership Inference Attacks

Authors: Najeeb Jebreel, David Sánchez, Josep Domingo-Ferrer | Published: 2026-03-24
Privacy Leakage
Membership Inference
Evaluation Method

Privacy-Preserving EHR Data Transformation via Geometric Operators: A Human-AI Co-Design Technical Report

Authors: Maolin Wang, Beining Bao, Gan Yuan, Hongyu Chen, Bingkun Zhao, Baoshuo Kan, Jiming Xu, Qi Shi, Yinggong Zhao, Yao Wang, Wei Ying Ma, Jun Yan | Published: 2026-03-24
Data Privacy Assessment
Privacy Leakage
Evaluation Method

CIPL: A Target-Independent Framework for Channel-Inversion Privacy Leakage in Agents

Authors: Tao Huang, Chen Hou, Jiayang Meng | Published: 2026-03-24
Privacy Leakage
Model Inversion
Evaluation Method

PlanTwin: Privacy-Preserving Planning Abstractions for Cloud-Assisted LLM Agents

Authors: Guangsheng Yu, Qin Wang, Rui Lang, Shuai Su, Xu Wang | Published: 2026-03-19
Indirect Prompt Injection
Privacy Leakage
Evaluation Method

Differential Privacy in Generative AI Agents: Analysis and Optimal Tradeoffs

Authors: Ya-Ting Yang, Quanyan Zhu | Published: 2026-03-18
Privacy Leakage
Differential Privacy
Evaluation Method

Deanonymizing Bitcoin Transactions via Network Traffic Analysis with Semi-supervised Learning

Authors: Shihan Zhang, Bing Han, Chuanyong Tian, Ruisheng Shi, Lina Lan, Qin Wang | Published: 2026-03-18
Privacy Leakage
Machine Learning Application
Evaluation Method

Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships

Authors: Bin Wang, Hui Li, Liyang Zhang, Qijia Zhuang, Ao Yang, Dong Zhang, Xijun Luo, Bing Lin | Published: 2025-12-09
Privacy Leakage
偽陽性分析
Information Security

An In-Depth Analysis of Cyber Attacks in Secured Platforms

Authors: Parick Ozoh, John K Omoniyi, Bukola Ibitoye | Published: 2025-10-29
Cyber Threat
Privacy Leakage
Defense Method

Can Large Language Models Really Recognize Your Name?

Authors: Dzung Pham, Peter Kairouz, Niloofar Mireshghallah, Eugene Bagdasarian, Chau Minh Pham, Amir Houmansadr | Published: 2025-05-20
LLM Security
Indirect Prompt Injection
Privacy Leakage

Fragments to Facts: Partial-Information Fragment Inference from LLMs

Authors: Lucas Rosenblatt, Bin Han, Robert Wolfe, Bill Howe | Published: 2025-05-20
Privacy Leakage
Prompt leaking
Threats of Medical AI