Confidential Prompting: Privacy-preserving LLM Inference on Cloud Authors: Caihua Li, In Gim, Lin Zhong | Published: 2024-09-27 | Updated: 2025-08-25 Process Partitioning MethodPrompt leakingModel Extraction Attack 2024.09.27 2025.08.27 Literature Database
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes Authors: Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini | Published: 2019-11-06 Process Partitioning MethodAttack TypeAttack Detection 2019.11.06 2025.05.28 Literature Database