Software Bill of Materials in Software Supply Chain Security A Systematic Literature Review Authors: Eric O'Donoghue, Yvette Hastings, Ernesto Ortiz, A. Redempta Manzi Muneza | Published: 2025-06-04 SBOM分析Risk AssessmentCauses of Information Leakage 2025.06.04 2025.06.06 Literature Database
Unveiling Privacy Risks in LLM Agent Memory Authors: Bo Wang, Weiyi He, Shenglai Zeng, Zhen Xiang, Yue Xing, Jiliang Tang, Pengfei He | Published: 2025-02-17 | Updated: 2025-06-03 Privacy AnalysisPrompt leakingCauses of Information Leakage 2025.02.17 2025.06.05 Literature Database
Distribution inference risks: Identifying and mitigating sources of leakage Authors: Valentin Hartmann, Léo Meynent, Maxime Peyrard, Dimitrios Dimitriadis, Shruti Tople, Robert West | Published: 2022-09-18 Data LeakageMembership InferenceCauses of Information Leakage 2022.09.18 2025.05.28 Literature Database
A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric Authors: Zekun Xu, Abhinav Aggarwal, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-10-22 Text Perturbation MethodCauses of Information LeakageMachine Learning Algorithm 2020.10.22 2025.05.28 Literature Database
Using Blockchain to Rein in The New Post-Truth World and Check The Spread of Fake News Authors: Adnan Qayyum, Junaid Qadir, Muhammad Umar Janjua, Falak Sher | Published: 2019-03-28 Detection of MisinformationPsychological ManipulationCauses of Information Leakage 2019.03.28 2025.05.28 Literature Database
Evaluating Differentially Private Machine Learning in Practice Authors: Bargav Jayaraman, David Evans | Published: 2019-02-24 | Updated: 2019-08-12 Membership InferenceDifferential PrivacyCauses of Information Leakage 2019.02.24 2025.05.28 Literature Database
Do Not Return Similarity: Face Recovery with Distance Authors: Mingtian Tan, Zhe Zhou | Published: 2019-01-28 | Updated: 2019-08-06 Causes of Information LeakageFacial Recognition TechnologyHigh-Dimensional Data Analysis 2019.01.28 2025.05.28 Literature Database