PLeak: Prompt Leaking Attacks against Large Language Model Applications Authors: Bo Hui, Haolin Yuan, Neil Gong, Philippe Burlina, Yinzhi Cao | Published: 2024-05-10 | Updated: 2024-05-14 LLM Performance EvaluationPrompt InjectionMembership Inference 2024.05.10 2025.05.27 Literature Database
Model Inversion Robustness: Can Transfer Learning Help? Authors: Sy-Tuyen Ho, Koh Jun Hao, Keshigeyan Chandrasegaran, Ngoc-Bao Nguyen, Ngai-Man Cheung | Published: 2024-05-09 Privacy Protection MethodMembership InferenceDefense Method 2024.05.09 2025.05.27 Literature Database
IPFed: Identity protected federated learning for user authentication Authors: Yosuke Kaga, Yusei Suzuki, Kenta Takahashi | Published: 2024-05-07 Privacy Protection MethodMembership InferenceFace Recognition System 2024.05.07 2025.05.27 Literature Database
The Federation Strikes Back: A Survey of Federated Learning Privacy Attacks, Defenses, Applications, and Policy Landscape Authors: Joshua C. Zhao, Saurabh Bagchi, Salman Avestimehr, Kevin S. Chan, Somali Chaterji, Dimitris Dimitriadis, Jiacheng Li, Ninghui Li, Arash Nourian, Holger R. Roth | Published: 2024-05-06 | Updated: 2025-03-22 Privacy Protection MethodPoisoningMembership Inference 2024.05.06 2025.05.27 Literature Database
Evaluations of Machine Learning Privacy Defenses are Misleading Authors: Michael Aerni, Jie Zhang, Florian Tramèr | Published: 2024-04-26 | Updated: 2024-09-05 Privacy Protection MethodMembership InferenceAdversarial Example 2024.04.26 2025.05.27 Literature Database
Reliable Model Watermarking: Defending Against Theft without Compromising on Evasion Authors: Hongyu Zhu, Sichu Liang, Wentao Hu, Fangqi Li, Ju Jia, Shilin Wang | Published: 2024-04-21 Membership InferenceWatermark RobustnessWatermark Evaluation 2024.04.21 2025.05.27 Literature Database
Optimization of Lightweight Malware Detection Models For AIoT Devices Authors: Felicia Lo, Shin-Ming Cheng, Rafael Kaliski | Published: 2024-04-06 Membership InferenceModel Performance EvaluationResource optimization 2024.04.06 2025.05.27 Literature Database
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning Authors: Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue | Published: 2024-04-04 WatermarkingMembership InferenceLabel Inference Attack 2024.04.04 2025.05.27 Literature Database
Privacy Backdoors: Enhancing Membership Inference through Poisoning Pre-trained Models Authors: Yuxin Wen, Leo Marchyok, Sanghyun Hong, Jonas Geiping, Tom Goldstein, Nicholas Carlini | Published: 2024-04-01 Backdoor AttackPoisoningMembership Inference 2024.04.01 2025.05.27 Literature Database
Protecting Copyrighted Material with Unique Identifiers in Large Language Model Training Authors: Shuai Zhao, Linchao Zhu, Ruijie Quan, Yi Yang | Published: 2024-03-23 | Updated: 2024-08-12 WatermarkingMembership InferenceWatermark Evaluation 2024.03.23 2025.05.27 Literature Database