プライバシー分析

Pr$εε$mpt: Sanitizing Sensitive Prompts for LLMs

Authors: Amrita Roy Chowdhury, David Glukhov, Divyam Anshumaan, Prasad Chalasani, Nicolas Papernot, Somesh Jha, Mihir Bellare | Published: 2025-04-07
RAG
インダイレクトプロンプトインジェクション
プライバシー分析

Empirical Analysis of Privacy-Fairness-Accuracy Trade-offs in Federated Learning: A Step Towards Responsible AI

Authors: Dawood Wasif, Dian Chen, Sindhuja Madabushi, Nithin Alluru, Terrence J. Moore, Jin-Hee Cho | Published: 2025-03-20
プライバシー分析
公平性のトレードオフ
差分プライバシー

Data Reconstruction Attacks and Defenses: A Systematic Evaluation

Authors: Sheng Liu, Zihan Wang, Yuxiao Chen, Qi Lei | Published: 2024-02-13 | Updated: 2025-03-22
プライバシー分析
モデルの堅牢性
敵対的攻撃

Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD

Authors: Anvith Thudi, Hengrui Jia, Casey Meehan, Ilia Shumailov, Nicolas Papernot | Published: 2023-07-01 | Updated: 2024-07-16
セキュリティ保証
データの隠蔽
プライバシー分析

Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting

Authors: Ana-Maria Cretu, Daniel Jones, Yves-Alexandre de Montjoye, Shruti Tople | Published: 2023-06-08 | Updated: 2024-03-12
プライバシー分析
メンバーシップ推論
モデルアーキテクチャ

Security and Privacy Problems in Voice Assistant Applications: A Survey

Authors: Jingjin Li, Chao chen, Lei Pan, Mostafa Rahimi Azghadi, Hossein Ghodosi, Jun Zhang | Published: 2023-04-19
バックドア攻撃
プライバシー分析
音声認識プロセス

A Randomized Approach for Tight Privacy Accounting

Authors: Jiachen T. Wang, Saeed Mahloujifar, Tong Wu, Ruoxi Jia, Prateek Mittal | Published: 2023-04-17 | Updated: 2023-11-21
プライバシー分析
プライバシー手法
統計的手法

Privacy-Preserving Matrix Factorization for Recommendation Systems using Gaussian Mechanism

Authors: Sohan Salahuddin Mugdho, Hafiz Imtiaz | Published: 2023-04-11
ウォーターマーキング
プライバシー分析
プライバシー手法

Multi-step Jailbreaking Privacy Attacks on ChatGPT

Authors: Haoran Li, Dadi Guo, Wei Fan, Mingshi Xu, Jie Huang, Fanpu Meng, Yangqiu Song | Published: 2023-04-11 | Updated: 2023-11-01
LLMセキュリティ
プライバシー分析
プロンプトインジェクション

Does Prompt-Tuning Language Model Ensure Privacy?

Authors: Shangyu Xie, Wei Dai, Esha Ghosh, Sambuddha Roy, Dan Schwartz, Kim Laine | Published: 2023-04-07 | Updated: 2023-04-15
プライバシー分析
プライバシー手法
攻撃の評価