Synth-MIA: A Testbed for Auditing Privacy Leakage in Tabular Data Synthesis Authors: Joshua Ward, Xiaofeng Lin, Chi-Hua Wang, Guang Cheng | Published: 2025-09-22 Privacy AnalysisMembership InferenceDifferential Privacy 2025.09.22 2025.09.24 Literature Database
Differential Privacy in Federated Learning: Mitigating Inference Attacks with Randomized Response Authors: Ozer Ozturk, Busra Buyuktanir, Gozde Karatas Baydogmus, Kazim Yildiz | Published: 2025-09-17 AlgorithmPrivacy AnalysisDifferential Privacy 2025.09.17 2025.09.19 Literature Database
Privacy-Aware In-Context Learning for Large Language Models Authors: Bishnu Bhusal, Manoj Acharya, Ramneet Kaur, Colin Samplawski, Anirban Roy, Adam D. Cobb, Rohit Chadha, Susmit Jha | Published: 2025-09-17 Differential PrivacyInformation ExtractionWatermark 2025.09.17 2025.09.19 Literature Database
EByFTVeS: Efficient Byzantine Fault Tolerant-based Verifiable Secret-sharing in Distributed Privacy-preserving Machine Learning Authors: Zhen Li, Zijian Zhang, Wenjin Yang, Pengbo Wang, Zhaoqi Wang, Meng Li, Yan Wu, Xuyang Liu, Jing Sun, Liehuang Zhu | Published: 2025-09-16 Secure AggregationDifferential PrivacyAdversarial Learning 2025.09.16 2025.09.18 Literature Database
DP-FedLoRA: Privacy-Enhanced Federated Fine-Tuning for On-Device Large Language Models Authors: Honghui Xu, Shiva Shrestha, Wei Chen, Zhiyuan Li, Zhipeng Cai | Published: 2025-09-11 Privacy TechniqueConvergence AnalysisDifferential Privacy 2025.09.11 2025.09.13 Literature Database
Towards Confidential and Efficient LLM Inference with Dual Privacy Protection Authors: Honglan Yu, Yibin Wang, Feifei Dai, Dong Liu, Haihui Fan, Xiaoyan Gu | Published: 2025-09-11 AlgorithmPrivacy TechniqueDifferential Privacy 2025.09.11 2025.09.13 Literature Database
A Comprehensive Guide to Differential Privacy: From Theory to User Expectations Authors: Napsu Karmitsa, Antti Airola, Tapio Pahikkala, Tinja Pitkämäki | Published: 2025-09-03 Detection of Poison Data for Backdoor AttacksPrivacy Design PrinciplesDifferential Privacy 2025.09.03 2025.09.05 Literature Database
The Double-edged Sword of LLM-based Data Reconstruction: Understanding and Mitigating Contextual Vulnerability in Word-level Differential Privacy Text Sanitization Authors: Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes | Published: 2025-08-26 Prompt leakingDifferential Privacy文書プライバシー 2025.08.26 2025.08.28 Literature Database
SoK: Data Minimization in Machine Learning Authors: Robin Staab, Nikola Jovanović, Kimberly Mai, Prakhar Ganesh, Martin Vechev, Ferdinando Fioretto, Matthew Jagielski | Published: 2025-08-14 RAGPrivacy AssessmentDifferential Privacy 2025.08.14 2025.08.16 Literature Database
Uncertainty-Driven Reliability: Selective Prediction and Trustworthy Deployment in Modern Machine Learning Authors: Stephan Rabanser | Published: 2025-08-11 Data CurationDifferential Privacy 2025.08.11 2025.08.13 Literature Database