Adversarial Machine Unlearning Authors: Zonglin Di, Sixie Yu, Yevgeniy Vorobeychik, Yang Liu | Published: 2024-06-11 Membership InferenceOptimization Problem 2024.06.11 2025.05.27 Literature Database
LLM Dataset Inference: Did you train on my dataset? Authors: Pratyush Maini, Hengrui Jia, Nicolas Papernot, Adam Dziedzic | Published: 2024-06-10 LLM SecurityData Privacy AssessmentMembership Inference 2024.06.10 2025.05.27 Literature Database
A Survey on Machine Unlearning: Techniques and New Emerged Privacy Risks Authors: Hengzhu Liu, Ping Xiong, Tianqing Zhu, Philip S. Yu | Published: 2024-06-10 Backdoor AttackPoisoningMembership Inference 2024.06.10 2025.05.27 Literature Database
Model for Peanuts: Hijacking ML Models without Training Access is Possible Authors: Mahmoud Ghorbel, Halima Bouzidi, Ioan Marius Bilasco, Ihsen Alouani | Published: 2024-06-03 Membership InferenceAttack MethodFace Recognition System 2024.06.03 2025.05.27 Literature Database
Lost in the Averages: A New Specific Setup to Evaluate Membership Inference Attacks Against Machine Learning Models Authors: Florent Guépin, Nataša Krčo, Matthieu Meeus, Yves-Alexandre de Montjoye | Published: 2024-05-24 Membership InferenceEvaluation Method 2024.05.24 2025.05.27 Literature Database
Tighter Privacy Auditing of DP-SGD in the Hidden State Threat Model Authors: Tudor Cebere, Aurélien Bellet, Nicolas Papernot | Published: 2024-05-23 | Updated: 2024-10-14 Data Privacy AssessmentPrivacy Protection MethodMembership Inference 2024.05.23 2025.05.27 Literature Database
Information Leakage from Embedding in Large Language Models Authors: Zhipeng Wan, Anda Cheng, Yinggui Wang, Lei Wang | Published: 2024-05-20 | Updated: 2024-05-22 LLM Performance EvaluationMembership InferenceModel Performance Evaluation 2024.05.20 2025.05.27 Literature Database
Learnable Privacy Neurons Localization in Language Models Authors: Ruizhe Chen, Tianxiang Hu, Yang Feng, Zuozhu Liu | Published: 2024-05-16 LLM SecurityPrivacy Protection MethodMembership Inference 2024.05.16 2025.05.27 Literature Database
PLeak: Prompt Leaking Attacks against Large Language Model Applications Authors: Bo Hui, Haolin Yuan, Neil Gong, Philippe Burlina, Yinzhi Cao | Published: 2024-05-10 | Updated: 2024-05-14 LLM Performance EvaluationPrompt InjectionMembership Inference 2024.05.10 2025.05.27 Literature Database
Model Inversion Robustness: Can Transfer Learning Help? Authors: Sy-Tuyen Ho, Koh Jun Hao, Keshigeyan Chandrasegaran, Ngoc-Bao Nguyen, Ngai-Man Cheung | Published: 2024-05-09 Privacy Protection MethodMembership InferenceDefense Method 2024.05.09 2025.05.27 Literature Database