A Critical Review on the Effectiveness and Privacy Threats of Membership Inference Attacks Authors: Najeeb Jebreel, David Sánchez, Josep Domingo-Ferrer | Published: 2026-03-24 Privacy LeakageMembership InferenceEvaluation Method 2026.03.24 2026.03.26 Literature Database
Privacy-Preserving EHR Data Transformation via Geometric Operators: A Human-AI Co-Design Technical Report Authors: Maolin Wang, Beining Bao, Gan Yuan, Hongyu Chen, Bingkun Zhao, Baoshuo Kan, Jiming Xu, Qi Shi, Yinggong Zhao, Yao Wang, Wei Ying Ma, Jun Yan | Published: 2026-03-24 Data Privacy AssessmentPrivacy LeakageEvaluation Method 2026.03.24 2026.03.26 Literature Database
CIPL: A Target-Independent Framework for Channel-Inversion Privacy Leakage in Agents Authors: Tao Huang, Chen Hou, Jiayang Meng | Published: 2026-03-24 Privacy LeakageModel InversionEvaluation Method 2026.03.24 2026.03.26 Literature Database
PlanTwin: Privacy-Preserving Planning Abstractions for Cloud-Assisted LLM Agents Authors: Guangsheng Yu, Qin Wang, Rui Lang, Shuai Su, Xu Wang | Published: 2026-03-19 Indirect Prompt InjectionPrivacy LeakageEvaluation Method 2026.03.19 2026.03.25 Literature Database
Differential Privacy in Generative AI Agents: Analysis and Optimal Tradeoffs Authors: Ya-Ting Yang, Quanyan Zhu | Published: 2026-03-18 Privacy LeakageDifferential PrivacyEvaluation Method 2026.03.18 2026.03.25 Literature Database
Deanonymizing Bitcoin Transactions via Network Traffic Analysis with Semi-supervised Learning Authors: Shihan Zhang, Bing Han, Chuanyong Tian, Ruisheng Shi, Lina Lan, Qin Wang | Published: 2026-03-18 Privacy LeakageMachine Learning ApplicationEvaluation Method 2026.03.18 2026.03.25 Literature Database
Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships Authors: Bin Wang, Hui Li, Liyang Zhang, Qijia Zhuang, Ao Yang, Dong Zhang, Xijun Luo, Bing Lin | Published: 2025-12-09 Privacy Leakage偽陽性分析Information Security 2025.12.09 2025.12.11 Literature Database
An In-Depth Analysis of Cyber Attacks in Secured Platforms Authors: Parick Ozoh, John K Omoniyi, Bukola Ibitoye | Published: 2025-10-29 Cyber ThreatPrivacy LeakageDefense Method 2025.10.29 2025.10.31 Literature Database
Can Large Language Models Really Recognize Your Name? Authors: Dzung Pham, Peter Kairouz, Niloofar Mireshghallah, Eugene Bagdasarian, Chau Minh Pham, Amir Houmansadr | Published: 2025-05-20 LLM SecurityIndirect Prompt InjectionPrivacy Leakage 2025.05.20 2025.05.28 Literature Database
Fragments to Facts: Partial-Information Fragment Inference from LLMs Authors: Lucas Rosenblatt, Bin Han, Robert Wolfe, Bill Howe | Published: 2025-05-20 Privacy LeakagePrompt leakingThreats of Medical AI 2025.05.20 2025.05.28 Literature Database