A Critical Review on the Effectiveness and Privacy Threats of Membership Inference Attacks Authors: Najeeb Jebreel, David Sánchez, Josep Domingo-Ferrer | Published: 2026-03-24 Privacy LeakageMembership InferenceEvaluation Method 2026.03.24 2026.03.26 Literature Database
Functional Subspace Watermarking for Large Language Models Authors: Zikang Ding, Junhao Li, Suling Wu, Junchi Yao, Hongbo Liu, Lijie Hu | Published: 2026-03-19 WatermarkingPrompt leakingMembership Inference 2026.03.19 2026.03.25 Literature Database
Sequential Membership Inference Attacks Authors: Thomas Michel, Debabrota Basu, Emilie Kaufmann | Published: 2026-02-18 Privacy Risk ManagementMembership InferenceDefense Method 2026.02.18 2026.02.20 Literature Database
LoRA and Privacy: When Random Projections Help (and When They Don’t) Authors: Yaxi Hu, Johanna Düngler, Bernhard Schölkopf, Amartya Sanyal | Published: 2026-01-29 Privacy protection frameworkMembership InferenceDifferential Privacy 2026.01.29 2026.01.31 Literature Database
Window-based Membership Inference Attacks Against Fine-tuned Large Language Models Authors: Yuetian Chen, Yuntao Du, Kaiyuan Zhang, Ashish Kundu, Charles Fleming, Bruno Ribeiro, Ninghui Li | Published: 2026-01-06 Ensemble LearningPrivacy Enhancing TechnologyMembership Inference 2026.01.06 2026.01.08 Literature Database
GRPO Privacy Is at Risk: A Membership Inference Attack Against Reinforcement Learning With Verifiable Rewards Authors: Yule Liu, Heyi Zhang, Jinyi Zheng, Zhen Sun, Zifan Peng, Tianshuo Cong, Yilong Yang, Xinlei He, Zhuo Ma | Published: 2025-11-18 Privacy TechniqueMembership InferenceDifferential Privacy 2025.11.18 2025.11.20 Literature Database
Interpretable Ransomware Detection Using Hybrid Large Language Models: A Comparative Analysis of BERT, RoBERTa, and DeBERTa Through LIME and SHAP Authors: Elodie Mutombo Ngoie, Mike Nkongolo Wa Nkongolo, Peace Azugo, Mahmut Tokmak | Published: 2025-11-17 Membership InferenceDeep Learning-Based IDSFeature Selection Method 2025.11.17 2025.11.19 Literature Database
Model Inversion Attacks Meet Cryptographic Fuzzy Extractors Authors: Mallika Prabhakar, Louise Xu, Prateek Saxena | Published: 2025-10-29 Membership InferenceModel InversionDefense Method 2025.10.29 2025.10.31 Literature Database
Traveling Salesman-Based Token Ordering Improves Stability in Homomorphically Encrypted Language Models Authors: Donghwan Rho, Sieun Seo, Hyewon Sung, Chohong Min, Ernest K. Ryu | Published: 2025-10-14 Token Distribution AnalysisMembership InferenceLarge Language Model 2025.10.14 2025.10.16 Literature Database
Synth-MIA: A Testbed for Auditing Privacy Leakage in Tabular Data Synthesis Authors: Joshua Ward, Xiaofeng Lin, Chi-Hua Wang, Guang Cheng | Published: 2025-09-22 Privacy AnalysisMembership InferenceDifferential Privacy 2025.09.22 2025.09.24 Literature Database