Differential Privacy for Secure Machine Learning in Healthcare IoT-Cloud Systems Authors: N Mangala, Murtaza Rangwala, S Aishwarya, B Eswara Reddy, Rajkumar Buyya, KR Venugopal, SS Iyengar, LM Patnaik | Published: 2025-12-11 Detection of Poison Data for Backdoor AttacksPrivacy Enhancing TechnologyDifferential Privacy 2025.12.11 2025.12.13 Literature Database
Scaling Trust in Quantum Federated Learning: A Multi-Protocol Privacy Design Authors: Dev Gurung, Shiva Raj Pokhrel | Published: 2025-12-03 Privacy ProtectionDifferential PrivacyFederated Learning 2025.12.03 2025.12.05 Literature Database
Observational Auditing of Label Privacy Authors: Iden Kalemaj, Luca Melis, Maxime Boucher, Ilya Mironov, Saeed Mahloujifar | Published: 2025-11-18 Detection of Poison Data for Backdoor AttacksPrivacy TechniqueDifferential Privacy 2025.11.18 2025.11.20 Literature Database
GRPO Privacy Is at Risk: A Membership Inference Attack Against Reinforcement Learning With Verifiable Rewards Authors: Yule Liu, Heyi Zhang, Jinyi Zheng, Zhen Sun, Zifan Peng, Tianshuo Cong, Yilong Yang, Xinlei He, Zhuo Ma | Published: 2025-11-18 Privacy TechniqueMembership InferenceDifferential Privacy 2025.11.18 2025.11.20 Literature Database
Tight and Practical Privacy Auditing for Differentially Private In-Context Learning Authors: Yuyang Xia, Ruixuan Liu, Li Xiong | Published: 2025-11-17 Privacy TechniqueAnonymization TechnologyDifferential Privacy 2025.11.17 2025.11.19 Literature Database
Secure Sparse Matrix Multiplications and their Applications to Privacy-Preserving Machine Learning Authors: Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon | Published: 2025-10-16 Data ProtectionPrivacy-Preserving Machine LearningDifferential Privacy 2025.10.16 2025.10.18 Literature Database
Synth-MIA: A Testbed for Auditing Privacy Leakage in Tabular Data Synthesis Authors: Joshua Ward, Xiaofeng Lin, Chi-Hua Wang, Guang Cheng | Published: 2025-09-22 Privacy AnalysisMembership InferenceDifferential Privacy 2025.09.22 2025.09.24 Literature Database
Differential Privacy in Federated Learning: Mitigating Inference Attacks with Randomized Response Authors: Ozer Ozturk, Busra Buyuktanir, Gozde Karatas Baydogmus, Kazim Yildiz | Published: 2025-09-17 AlgorithmPrivacy AnalysisDifferential Privacy 2025.09.17 2025.09.19 Literature Database
Privacy-Aware In-Context Learning for Large Language Models Authors: Bishnu Bhusal, Manoj Acharya, Ramneet Kaur, Colin Samplawski, Anirban Roy, Adam D. Cobb, Rohit Chadha, Susmit Jha | Published: 2025-09-17 Differential PrivacyInformation ExtractionWatermark 2025.09.17 2025.09.19 Literature Database
EByFTVeS: Efficient Byzantine Fault Tolerant-based Verifiable Secret-sharing in Distributed Privacy-preserving Machine Learning Authors: Zhen Li, Zijian Zhang, Wenjin Yang, Pengbo Wang, Zhaoqi Wang, Meng Li, Yan Wu, Xuyang Liu, Jing Sun, Liehuang Zhu | Published: 2025-09-16 Secure AggregationDifferential PrivacyAdversarial Learning 2025.09.16 2025.09.18 Literature Database