Hierarchical Clustering

Enhancing Leakage Attacks on Searchable Symmetric Encryption Using LLM-Based Synthetic Data Generation

Authors: Joshua Chiu, Partha Protim Paul, Zahin Wahab | Published: 2025-04-29
Indirect Prompt Injection
Attack Method
Hierarchical Clustering

Private Hierarchical Clustering and Efficient Approximation

Authors: Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos | Published: 2019-04-09 | Updated: 2021-10-01
Privacy Enhancing Technology
Encryption Technology
Hierarchical Clustering