Inversion Attacks
Table of Contents
SIGIR
IEEE J. Biomed. Health Informatics
IEEE Trans. Syst. Man Cybern. Syst.
J. Artif. Intell. Res.
IEEE Trans. Neural Networks
IEEE Trans. Intell. Transp. Syst.
IEEE ACM Trans. Audio Speech Lang. Process.
IEEE Trans. Speech Audio Process.
MobiCom
CollSec
ICSE Companion
ACM Trans. Intell. Syst. Technol.
ACM Trans. Knowl. Discov. Data
IEEE Trans. Cybern.
ACM Trans. Inf. Syst. Secur.
Mach. Learn.
Int. J. Comput. Vis.
Comput. Vis. Image Underst.
IJCAI
Expand IJCAI
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| MMGIA: Gradient Inversion Attack Against Multimodal Federated Learning via Intermodal Correlation. | IJCAI | 2025 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Boosting Decision-Based Black-Box Adversarial Attack with Gradient Priors. | IJCAI | 2023 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| A Survey on Gradient Inversion: Attacks, Defenses and Future Directions. | IJCAI | 2022 | Link |
| Measuring Data Leakage in Machine-Learning Models with Fisher Information (Extended Abstract). | IJCAI | 2022 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion. | IJCAI | 2021 | Link |
2015
| Title | Venue | Year | Link |
|---|---|---|---|
| Regression Model Fitting under Differential Privacy and Model Inversion Attack. | IJCAI | 2015 | Link |
1989
| Title | Venue | Year | Link |
|---|---|---|---|
| A "Small Leakage" Model for Diffusion Smoothing of Image Data. | IJCAI | 1989 | Link |
AAAI
Expand AAAI
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| A New Federated Learning Framework Against Gradient Inversion Attacks. | AAAI | 2025 | Link |
| A Sample-Level Evaluation and Generative Framework for Model Inversion Attacks. | AAAI | 2025 | Link |
| Against All Odds: Overcoming Typology, Script, and Language Confusion in Multilingual Embedding Inversion Attacks. | AAAI | 2025 | Link |
| AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples. | AAAI | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Compositional Inversion for Stable Diffusion Models. | AAAI | 2024 | Link |
| DreamStyler: Paint by Style Inversion with Text-to-Image Diffusion Models. | AAAI | 2024 | Link |
| Foreseeing Reconstruction Quality of Gradient Inversion: An Optimization Perspective. | AAAI | 2024 | Link |
| High-Fidelity Gradient Inversion in Distributed Learning. | AAAI | 2024 | Link |
| IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking. | AAAI | 2024 | Link |
| Music Style Transfer with Time-Varying Inversion of Diffusion Models. | AAAI | 2024 | Link |
| Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks. | AAAI | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Let Graph Be the Go Board: Gradient-Free Node Injection Attack for Graph Neural Networks via Reinforcement Learning. | AAAI | 2023 | Link |
| MGIA: Mutual Gradient Inversion Attack in Multi-Modal Federated Learning (Student Abstract). | AAAI | 2023 | Link |
| Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network. | AAAI | 2023 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| Improved Gradient-Based Adversarial Attacks for Quantized Networks. | AAAI | 2022 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| Adversarial Training with Fast Gradient Projection Method against Synonym Substitution Based Text Attacks. | AAAI | 2021 | Link |
| Beating Attackers At Their Own Games: Adversarial Example Detection Using Adversarial Gradient Directions. | AAAI | 2021 | Link |
| Improving Robustness to Model Inversion Attacks via Mutual Information Regularization. | AAAI | 2021 | Link |
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| A New Ensemble Adversarial Attack Powered by Long-Term Gradient Memories. | AAAI | 2020 | Link |
2013
| Title | Venue | Year | Link |
|---|---|---|---|
| Gradient Networks: Explicit Shape Matching Without Extracting Edges. | AAAI | 2013 | Link |
AISTATS
Expand AISTATS
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| MEDUSA: Medical Data Under Shadow Attacks via Hybrid Model Inversion. | AISTATS | 2025 | Link |
| Signal Recovery from Random Dot-Product Graphs under Local Differential Privacy. | AISTATS | 2025 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks. | AISTATS | 2021 | Link |
NeurIPS
Expand NeurIPS
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| BELM: Bidirectional Explicit Linear Multi-step Sampler for Exact Inversion in Diffusion Models. | NeurIPS | 2024 | Link |
| DAGER: Exact Gradient Inversion for Large Language Models. | NeurIPS | 2024 | Link |
| Gradient Cuff: Detecting Jailbreak Attacks on Large Language Models by Exploring Refusal Loss Landscapes. | NeurIPS | 2024 | Link |
| Gradient-free Decoder Inversion in Latent Diffusion Models. | NeurIPS | 2024 | Link |
| Pseudo-Private Data Guided Model Inversion Attacks. | NeurIPS | 2024 | Link |
| ReMAP: Neural Model Reprogramming with Network Inversion and Retrieval-Augmented Mapping for Adaptive Motion Forecasting. | NeurIPS | 2024 | Link |
| Reimagining Mutual Information for Enhanced Defense against Data Leakage in Collaborative Inference. | NeurIPS | 2024 | Link |
| SPEAR: Exact Gradient Inversion of Batches in Federated Learning. | NeurIPS | 2024 | Link |
| Trap-MID: Trapdoor-based Defense against Model Inversion Attacks. | NeurIPS | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Label-Only Model Inversion Attacks via Knowledge Transfer. | NeurIPS | 2023 | Link |
| Understanding Deep Gradient Leakage via Inversion Influence Functions. | NeurIPS | 2023 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| LAMP: Extracting Text from Gradients with Language Model Priors. | NeurIPS | 2022 | Link |
| Learning to Generate Inversion-Resistant Model Explanations. | NeurIPS | 2022 | Link |
| Recovering Private Text in Federated Learning of Language Models. | NeurIPS | 2022 | Link |
| Towards Reasonable Budget Allocation in Untargeted Graph Structure Attacks via Gradient Debias. | NeurIPS | 2022 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| Catastrophic Data Leakage in Vertical Federated Learning. | NeurIPS | 2021 | Link |
| Designing Counterfactual Generators using Deep Model Inversion. | NeurIPS | 2021 | Link |
| Evaluating Gradient Inversion Attacks and Defenses in Federated Learning. | NeurIPS | 2021 | Link |
| Gradient Inversion with Generative Image Prior. | NeurIPS | 2021 | Link |
| Variational Model Inversion Attacks. | NeurIPS | 2021 | Link |
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| Model Inversion Networks for Model-Based Optimization. | NeurIPS | 2020 | Link |
| Robustness of Bayesian Neural Networks to Gradient-Based Attacks. | NeurIPS | 2020 | Link |
2018
| Title | Venue | Year | Link |
|---|---|---|---|
| Faithful Inversion of Generative Models for Effective Amortized Inference. | NeurIPS | 2018 | Link |
ICML
Expand ICML
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Gradient Inversion of Multimodal Models. | ICML | 2025 | Link |
| How Contaminated Is Your Benchmark? Measuring Dataset Leakage in Large Language Models with Kernel Divergence. | ICML | 2025 | Link |
| Smoothed Preference Optimization via ReNoise Inversion for Aligning Diffusion Models with Varied Human Preferences. | ICML | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Differentially private exact recovery for stochastic block models. | ICML | 2024 | Link |
| Referee Can Play: An Alternative Approach to Conditional Generation via Model Inversion. | ICML | 2024 | Link |
| SignSGD with Federated Defense: Harnessing Adversarial Attacks through Gradient Sign Decoding. | ICML | 2024 | Link |
| Single-Model Attribution of Generative Models Through Final-Layer Inversion. | ICML | 2024 | Link |
| Sparse Model Inversion: Efficient Inversion of Vision Transformers for Data-Free Applications. | ICML | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| TabLeak: Tabular Data Leakage in Federated Learning. | ICML | 2023 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| An Equivalence Between Data Poisoning and Byzantine Gradient Attacks. | ICML | 2022 | Link |
| Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. | ICML | 2022 | Link |
| Diversified Adversarial Attacks based on Conjugate Gradient Method. | ICML | 2022 | Link |
| Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks. | ICML | 2022 | Link |
| Plug-In Inversion: Model-Agnostic Inversion for Vision with Data Augmentations. | ICML | 2022 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation. | ICML | 2021 | Link |
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| Min-Max Optimization without Gradients: Convergence and Applications to Black-Box Evasion and Poisoning Attacks. | ICML | 2020 | Link |
ICLR
Expand ICLR
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Activation Gradient based Poisoned Sample Detection Against Backdoor Attacks. | ICLR | 2025 | Link |
| ConcreTizer: Model Inversion Attack via Occupancy Classification and Dispersion Control for 3D Point Cloud Restoration. | ICLR | 2025 | Link |
| Lightning-Fast Image Inversion and Editing for Text-to-Image Diffusion Models. | ICLR | 2025 | Link |
| REFINE: Inversion-Free Backdoor Defense via Model Reprogramming. | ICLR | 2025 | Link |
| Stealthy Shield Defense: A Conditional Mutual Information-Based Approach against Black-Box Model Inversion Attacks. | ICLR | 2025 | Link |
| Visually Guided Decoding: Gradient-Free Hard Prompt Inversion with Language Models. | ICLR | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Be Careful What You Smooth For: Label Smoothing Can Be a Privacy Shield but Also a Catalyst for Model Inversion Attacks. | ICLR | 2024 | Link |
| Enhancing Transferable Adversarial Attacks on Vision Transformers through Gradient Normalization Scaling and High-Frequency Adaptation. | ICLR | 2024 | Link |
| Language Model Inversion. | ICLR | 2024 | Link |
| Towards Eliminating Hard Label Constraints in Gradient Inversion Attacks. | ICLR | 2024 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| Transferable Adversarial Attack based on Integrated Gradients. | ICLR | 2022 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| R-GAP: Recursive Gradient Attack on Privacy. | ICLR | 2021 | Link |
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks. | ICLR | 2020 | Link |
2018
| Title | Venue | Year | Link |
|---|---|---|---|
| Black-box Attacks on Deep Neural Networks via Gradient Estimation. | ICLR | 2018 | Link |
2013
| Title | Venue | Year | Link |
|---|---|---|---|
| Gradient Driven Learning for Pooling in Visual Pipeline Feature Extraction Models | ICLR | 2013 | Link |
UAI
Expand UAI
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Learning To Invert: Simple Adaptive Attacks for Gradient Inversion in Federated Learning. | UAI | 2023 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| Measuring data leakage in machine-learning models with Fisher information. | UAI | 2021 | Link |
IEEE Trans. Pattern Anal. Mach. Intell.
Expand IEEE Trans. Pattern Anal. Mach. Intell.
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Unknown-Aware Bilateral Dependency Optimization for Defending Against Model Inversion Attacks. | IEEE Trans. Pattern Anal. Mach. Intell. | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Gradient Inversion Attacks: Impact Factors Analyses and Privacy Enhancement. | IEEE Trans. Pattern Anal. Mach. Intell. | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Comprehensive Vulnerability Evaluation of Face Recognition Systems to Template Inversion Attacks via 3D Face Reconstruction. | IEEE Trans. Pattern Anal. Mach. Intell. | 2023 | Link |
2007
| Title | Venue | Year | Link |
|---|---|---|---|
| Normalization-Cooperated Gradient Feature Extraction for Handwritten Character Recognition. | IEEE Trans. Pattern Anal. Mach. Intell. | 2007 | Link |
1979
| Title | Venue | Year | Link |
|---|---|---|---|
| Image Feature Extraction Using Diameter-Limited Gradient Direction Histograms. | IEEE Trans. Pattern Anal. Mach. Intell. | 1979 | Link |
KDD
Expand KDD
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Prompt as a Double-Edged Sword: A Dynamic Equilibrium Gradient-Assigned Attack against Graph Prompt Learning. | KDD | 2025 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| Bilateral Dependency Optimization: Defending Against Model-inversion Attacks. | KDD | 2022 | Link |
| LeapAttack: Hard-Label Adversarial Attack on Text via Gradient-Based Optimization. | KDD | 2022 | Link |
2011
| Title | Venue | Year | Link |
|---|---|---|---|
| Leakage in data mining: formulation, detection, and avoidance. | KDD | 2011 | Link |
SP
Expand SP
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Is MPC Secure? Leveraging Neural Network Classifiers to Detect Data Leakage Vulnerabilities in MPC Implementations. | SP | 2025 | Link |
| Prompt Inversion Attack Against Collaborative Inference of Large Language Models. | SP | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs. | SP | 2024 | Link |
| Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning. | SP | 2024 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| LINKTELLER: Recovering Private Edges from Graph Neural Networks via Influence Analysis. | SP | 2022 | Link |
| Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation. | SP | 2022 | Link |
CCS
Expand CCS
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| IOValve: Leakage-Free I/O Sandbox for Large-Scale Untrusted Data Processing. | CCS | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Uncovering Gradient Inversion Risks in Practical Language Model Training. | CCS | 2024 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. | CCS | 2021 | Link |
2019
| Title | Venue | Year | Link |
|---|---|---|---|
| Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing. | CCS | 2019 | Link |
| Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality. | CCS | 2019 | Link |
2018
| Title | Venue | Year | Link |
|---|---|---|---|
| Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. | CCS | 2018 | Link |
| Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage. | CCS | 2018 | Link |
2016
| Title | Venue | Year | Link |
|---|---|---|---|
| UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages. | CCS | 2016 | Link |
2015
| Title | Venue | Year | Link |
|---|---|---|---|
| Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures. | CCS | 2015 | Link |
2013
| Title | Venue | Year | Link |
|---|---|---|---|
| AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. | CCS | 2013 | Link |
2000
| Title | Venue | Year | Link |
|---|---|---|---|
| Threshold-based identity recovery for privacy enhanced applications. | CCS | 2000 | Link |
USENIX Security Symposium
Expand USENIX Security Symposium
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL Settings. | USENIX Security Symposium | 2025 | Link |
| Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models. | USENIX Security Symposium | 2025 | Link |
| Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning. | USENIX Security Symposium | 2025 | Link |
| SoK: Gradient Inversion Attacks in Federated Learning. | USENIX Security Symposium | 2025 | Link |
| SpeechGuard: Recoverable and Customizable Speech Privacy Protection. | USENIX Security Symposium | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition. | USENIX Security Symposium | 2024 | Link |
| Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage. | USENIX Security Symposium | 2024 | Link |
| Length Leakage in Oblivious Data Access Mechanisms. | USENIX Security Symposium | 2024 | Link |
| Secure Account Recovery for a Privacy-Preserving Web Service. | USENIX Security Symposium | 2024 | Link |
| d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases. | USENIX Security Symposium | 2024 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. | USENIX Security Symposium | 2022 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| Leakage of Dataset Properties in Multi-Party Machine Learning. | USENIX Security Symposium | 2021 | Link |
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis. | USENIX Security Symposium | 2020 | Link |
| SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage. | USENIX Security Symposium | 2020 | Link |
NDSS
Expand NDSS
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling. | NDSS | 2025 | Link |
| LeakLess: Selective Data Protection against Memory Leakage Attacks for Serverless Platforms. | NDSS | 2025 | Link |
| Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction. | NDSS | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models. | NDSS | 2024 | Link |
| Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering. | NDSS | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes. | NDSS | 2023 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity. | NDSS | 2022 | Link |
2019
| Title | Venue | Year | Link |
|---|---|---|---|
| Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. | NDSS | 2019 | Link |
2015
| Title | Venue | Year | Link |
|---|---|---|---|
| Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. | NDSS | 2015 | Link |
2013
| Title | Venue | Year | Link |
|---|---|---|---|
| OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance. | NDSS | 2013 | Link |
CVPR
Expand CVPR
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning. | CVPR | 2025 | Link |
| Gradient Inversion Attacks on Parameter-Efficient Fine-Tuning. | CVPR | 2025 | Link |
| InPO: Inversion Preference Optimization with Reparametrized DDIM for Efficient Diffusion Model Alignment. | CVPR | 2025 | Link |
| Theoretical Insights in Model Inversion Robustness and Conditional Entropy Maximization for Collaborative Inference Systems. | CVPR | 2025 | Link |
| Towards Effective and Sparse Adversarial Attack on Spiking Neural Networks via Breaking Invisible Surrogate Gradients. | CVPR | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion. | CVPR | 2024 | Link |
| Defense Against Adversarial Attacks on No-Reference Image Quality Models with Gradient Norm Regularization. | CVPR | 2024 | Link |
| Dual-Consistency Model Inversion for Non-Exemplar Class Incremental Learning. | CVPR | 2024 | Link |
| Inversion-Free Image Editing with Language-Guided Diffusion Models. | CVPR | 2024 | Link |
| Localization is All You Evaluate: Data Leakage in Online Mapping Datasets and How to Fix it. | CVPR | 2024 | Link |
| Model Inversion Robustness: Can Transfer Learning Help? | CVPR | 2024 | Link |
| Prompting Hard or Hardly Prompting: Prompt Inversion for Text-to-Image Diffusion Models. | CVPR | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack. | CVPR | 2023 | Link |
| Efficient Loss Function by Minimizing the Detrimental Effect of Floating-Point Errors on Gradient-Based Attacks. | CVPR | 2023 | Link |
| Inversion-based Style Transfer with Diffusion Models. | CVPR | 2023 | Link |
| Null-text Inversion for Editing Real Images using Guided Diffusion Models. | CVPR | 2023 | Link |
| Privacy-Preserving Representations are not Enough: Recovering Scene Content from Camera Poses. | CVPR | 2023 | Link |
| Rate Gradient Approximation Attack Threats Deep Spiking Neural Networks. | CVPR | 2023 | Link |
| Re-Thinking Model Inversion Attacks Against Deep Neural Networks. | CVPR | 2023 | Link |
| Reinforcement Learning-Based Black-Box Model Inversion Attacks. | CVPR | 2023 | Link |
| Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization. | CVPR | 2023 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| GradViT: Gradient Inversion of Vision Transformers. | CVPR | 2022 | Link |
| Label-Only Model Inversion Attacks via Boundary Repulsion. | CVPR | 2022 | Link |
| ResSFL: A Resistance Transfer Framework for Defending Model Inversion Attack in Split Federated Learning. | CVPR | 2022 | Link |
| Robust Structured Declarative Classifiers for 3D Point Clouds: Defending Adversarial Attacks with Implicit Gradients. | CVPR | 2022 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| How Privacy-Preserving Are Line Clouds? Recovering Scene Details From 3D Lines. | CVPR | 2021 | Link |
| IMAGINE: Image Synthesis by Image-Guided Model Inversion. | CVPR | 2021 | Link |
| MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation. | CVPR | 2021 | Link |
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks. | CVPR | 2020 | Link |
2019
| Title | Venue | Year | Link |
|---|---|---|---|
| Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses. | CVPR | 2019 | Link |
2013
| Title | Venue | Year | Link |
|---|---|---|---|
| BFO Meets HOG: Feature Extraction Based on Histograms of Oriented p.d.f. Gradients for Image Classification. | CVPR | 2013 | Link |
| Supervised Semantic Gradient Extraction Using Linear-Time Optimization. | CVPR | 2013 | Link |
ICCV
Expand ICCV
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Boosting Adversarial Transferability via Gradient Relevance Attack. | ICCV | 2023 | Link |
| Controllable Inversion of Black-Box Face Recognition Models via Diffusion. | ICCV | 2023 | Link |
| GIFD: A Generative Gradient Inversion Method with Feature Domain Optimization. | ICCV | 2023 | Link |
| Generative Gradient Inversion via Over-Parameterized Networks in Federated Learning. | ICCV | 2023 | Link |
| Hard No-Box Adversarial Attack on Skeleton-Based Human Action Recognition with Skeleton-Motion-Informed Gradient. | ICCV | 2023 | Link |
| Prompt Tuning Inversion for Text-Driven Image Editing Using Diffusion Models. | ICCV | 2023 | Link |
| TIJO: Trigger Inversion with Joint Optimization for Defending Multimodal Backdoored Models. | ICCV | 2023 | Link |
| Template Inversion Attack against Face Recognition Systems using 3D Face Reconstruction. | ICCV | 2023 | Link |
| Transferable Adversarial Attack for Both Vision Transformers and Convolutional Networks via Momentum Integrated Gradients. | ICCV | 2023 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| Exploiting Explanations for Model Inversion Attacks. | ICCV | 2021 | Link |
| Knowledge-Enriched Distributional Model Inversion Attacks. | ICCV | 2021 | Link |
| Meta Gradient Adversarial Attack. | ICCV | 2021 | Link |
2007
| Title | Venue | Year | Link |
|---|---|---|---|
| On the Extraction of Curve Skeletons using Gradient Vector Flow. | ICCV | 2007 | Link |
ECCV
Expand ECCV
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion Attacks. | ECCV | 2024 | Link |
| Improving Robustness to Model Inversion Attacks via Sparse Coding Architectures. | ECCV | 2024 | Link |
| Learning a Dynamic Privacy-Preserving Camera Robust to Inversion Attacks. | ECCV | 2024 | Link |
| On the Vulnerability of Skip Connections to Model Inversion Attacks. | ECCV | 2024 | Link |
| Prediction Exposes Your Face: Black-Box Model Inversion via Prediction Alignment. | ECCV | 2024 | Link |
| Safeguard Text-to-Image Diffusion Models with Human Feedback Inversion. | ECCV | 2024 | Link |
| Source Prompt Disentangled Inversion for Boosting Image Editability with Diffusion Models. | ECCV | 2024 | Link |
| Viewpoint Textual Inversion: Discovering Scene Representations and 3D View Control in 2D Diffusion Models. | ECCV | 2024 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| SecretGen: Privacy Recovery on Pre-trained Models via Distribution Discrimination. | ECCV | 2022 | Link |
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| Defense Against Adversarial Attacks via Controlling Gradient Leaking on Embedded Manifolds. | ECCV | 2020 | Link |
2008
| Title | Venue | Year | Link |
|---|---|---|---|
| Image Feature Extraction Using Gradient Local Auto-Correlations. | ECCV | 2008 | Link |
ACM Multimedia
Expand ACM Multimedia
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| CapRecover: A Cross-Modality Feature Inversion Attack Framework on Vision Language Models. | ACM Multimedia | 2025 | Link |
| Inversion-DPO: Precise and Efficient Post-Training for Diffusion Models. | ACM Multimedia | 2025 | Link |
| MIG-COW: Transferable Adversarial Attacks on Deepfake Detectors via Gradient Decomposition. | ACM Multimedia | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Informative Point cloud Dataset Extraction for Classification via Gradient-based Points Moving. | ACM Multimedia | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Gradient-Free Textual Inversion. | ACM Multimedia | 2023 | Link |
| Model Inversion Attack via Dynamic Memory Learning. | ACM Multimedia | 2023 | Link |
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| Efficient Joint Gradient Based Attack Against SOR Defense for 3D Point Cloud Classification. | ACM Multimedia | 2020 | Link |
ACL
Expand ACL
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| ALGEN: Few-shot Inversion Attacks on Textual Embeddings via Cross-Model Alignment and Generation. | ACL | 2025 | Link |
| Mitigating Paraphrase Attacks on Machine-Text Detection via Paraphrase Inversion. | ACL | 2025 | Link |
| ObfusLM: Privacy-preserving Language Model Service against Embedding Inversion Attacks. | ACL | 2025 | Link |
| PIG: Privacy Jailbreak Attack on LLMs via Gradient-based Iterative In-Context Optimization. | ACL | 2025 | Link |
| Stealing Training Data from Large Language Models in Decentralized Training through Activation Inversion Attack. | ACL | 2025 | Link |
| The Inverse Scaling Effect of Pre-Trained Language Model Surprisal Is Not Due to Data Leakage. | ACL | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Continual Few-shot Relation Extraction via Adaptive Gradient Correction and Knowledge Decomposition. | ACL | 2024 | Link |
| Text Embedding Inversion Security for Multilingual Language Models. | ACL | 2024 | Link |
| Towards Multiple References Era - Addressing Data Leakage and Limited Reference Diversity in Machine Translation Evaluation. | ACL | 2024 | Link |
| Transferable Embedding Inversion Attack: Uncovering Privacy Risks in Text Embeddings without Model Queries. | ACL | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| A Gradient Control Method for Backdoor Attacks on Parameter-Efficient Tuning. | ACL | 2023 | Link |
| Bridge the Gap Between CV and NLP! A Gradient-based Textual Adversarial Attack Framework. | ACL | 2023 | Link |
| Sentence Embedding Leaks More Information than You Expect: Generative Embedding Inversion Attack to Recover the Whole Sentence. | ACL | 2023 | Link |
EMNLP
Expand EMNLP
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Investigating How Pre-training Data Leakage Affects Models' Reproduction and Detection Capabilities. | EMNLP | 2025 | Link |
| Reverse Prompt Engineering: A Zero-Shot, Genetic Algorithm Approach to Language Model Inversion. | EMNLP | 2025 | Link |
| Semantic Inversion, Identical Replies: Revisiting Negation Blindness in Large Language Models. | EMNLP | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| An Inversion Attack Against Obfuscated Embedding Matrix in Language Model Inference. | EMNLP | 2024 | Link |
| On Leakage of Code Generation Evaluation Datasets. | EMNLP | 2024 | Link |
| OpenSep: Leveraging Large Language Models with Textual Inversion for Open World Audio Separation. | EMNLP | 2024 | Link |
| SecureSQL: Evaluating Data Leakage of Large Language Models as Natural Language Interfaces to Databases. | EMNLP | 2024 | Link |
| Seeing the Forest through the Trees: Data Leakage from Partial Transformer Gradients. | EMNLP | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| UPTON: Preventing Authorship Leakage from Public Text Release via Data Poisoning. | EMNLP | 2023 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| Backdoor Attacks in Federated Learning by Rare Embeddings and Gradient Ensembling. | EMNLP | 2022 | Link |
| Invernet: An Inversion Attack Framework to Infer Fine-Tuning Datasets through Word Embeddings. | EMNLP | 2022 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| Gradient Imitation Reinforcement Learning for Low Resource Relation Extraction. | EMNLP | 2021 | Link |
| Gradient-based Adversarial Attacks against Text Transformers. | EMNLP | 2021 | Link |
| TAG: Gradient Attack on Transformer-based Language Models. | EMNLP | 2021 | Link |
COLING
Expand COLING
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Gradient Inversion Attack in Federated Learning: Exposing Text Data through Discrete Optimization. | COLING | 2025 | Link |
2012
| Title | Venue | Year | Link |
|---|---|---|---|
| Code-Switch Language Model with Inversion Constraints for Mixed Language Speech Recognition. | COLING | 2012 | Link |
1986
| Title | Venue | Year | Link |
|---|---|---|---|
| The Role of Inversion and PP-Fronting in Relating Discourse Elements: some implications for cognitive and computational models of Natural Language Processing. | COLING | 1986 | Link |
SIGIR
Expand SIGIR
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Information Leakage of Sentence Embeddings via Generative Embedding Inversion Attacks. | SIGIR | 2025 | Link |
WWW
Expand WWW
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Detecting Poisoning Attacks on Federated Learning Using Gradient-Weighted Class Activation Mapping. | WWW | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Ginver: Generative Model Inversion Attacks Against Collaborative Inference. | WWW | 2023 | Link |
| NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples. | WWW | 2023 | Link |
2019
| Title | Venue | Year | Link |
|---|---|---|---|
| UNVEIL: Capture and Visualise WiFi Data Leakages. | WWW | 2019 | Link |
| VACCINE: Using Contextual Integrity For Data Leakage Detection. | WWW | 2019 | Link |
2017
| Title | Venue | Year | Link |
|---|---|---|---|
| Trajectory Recovery From Ash: User Privacy Is NOT Preserved in Aggregated Mobility Data. | WWW | 2017 | Link |
DAC
Expand DAC
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Data Oblivious CPU: Microarchitectural Side-channel Leakage-Resilient Processor. | DAC | 2025 | Link |
| Ensembler: Protect Collaborative Inference Privacy from Model Inversion Attack via Selective Ensemble. | DAC | 2025 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| NNTesting: Neural Network Fault Attacks Detection Using Gradient-Based Test Vector Generation. | DAC | 2023 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| PRID: Model Inversion Privacy Attacks in Hyperdimensional Learning Systems. | DAC | 2021 | Link |
IEEE Trans. Computers
Expand IEEE Trans. Computers
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control. | IEEE Trans. Computers | 2021 | Link |
2000
| Title | Venue | Year | Link |
|---|---|---|---|
| Generalized Inversion Attack on Nonlinear Filter Generators. | IEEE Trans. Computers | 2000 | Link |
WACV
Expand WACV
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Negative-Prompt Inversion: Fast Image Inversion for Editing with Text-Guided Diffusion Models. | WACV | 2025 | Link |
| Recoverable Anonymization for Pose Estimation: A Privacy-Enhancing Approach. | WACV | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| PATROL: Privacy-Oriented Pruning for Collaborative Inference Against Model Inversion Attacks. | WACV | 2024 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| Reconstructing Training Data from Diverse ML Models by Ensemble Inversion. | WACV | 2022 | Link |
2019
| Title | Venue | Year | Link |
|---|---|---|---|
| Local Gradients Smoothing: Defense Against Localized Adversarial Attacks. | WACV | 2019 | Link |
2008
| Title | Venue | Year | Link |
|---|---|---|---|
| Iris Extraction Based on Intensity Gradient and Texture Difference. | WACV | 2008 | Link |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.
Expand IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.
2000
| Title | Venue | Year | Link |
|---|---|---|---|
| SPICE models for flicker noise in n-MOSFETs from subthreshold tostrong inversion. | IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. | 2000 | Link |
1992
| Title | Venue | Year | Link |
|---|---|---|---|
| A mobility model including the screening effect in MOS inversion layer. | IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. | 1992 | Link |
1989
| Title | Venue | Year | Link |
|---|---|---|---|
| Extracting transistor changes from device simulations by gradient fitting. | IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. | 1989 | Link |
| Universality of mobility-gate field characteristics of electrons in the inversion charge layer and its application in MOSFET modeling. | IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. | 1989 | Link |
IEEE Trans. Neural Networks Learn. Syst.
Expand IEEE Trans. Neural Networks Learn. Syst.
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Defending Against Neural Network Model Inversion Attacks via Data Poisoning. | IEEE Trans. Neural Networks Learn. Syst. | 2025 | Link |
| Neural Honeypoint: An Active Defense Framework Against Model Inversion Attacks. | IEEE Trans. Neural Networks Learn. Syst. | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| A Dynamic-Varying Parameter Enhanced ZNN Model for Solving Time-Varying Complex-Valued Tensor Inversion With Its Application to Image Encryption. | IEEE Trans. Neural Networks Learn. Syst. | 2024 | Link |
| GNN Model for Time-Varying Matrix Inversion With Robust Finite-Time Convergence. | IEEE Trans. Neural Networks Learn. Syst. | 2024 | Link |
| Gradient Correction for White-Box Adversarial Attacks. | IEEE Trans. Neural Networks Learn. Syst. | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Dynamic Moore-Penrose Inversion With Unknown Derivatives: Gradient Neural Network Approach. | IEEE Trans. Neural Networks Learn. Syst. | 2023 | Link |
| Exploring Adversarial Attack in Spiking Neural Networks With Spike-Compatible Gradient. | IEEE Trans. Neural Networks Learn. Syst. | 2023 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| SMGEA: A New Ensemble Adversarial Attack Powered by Long-Term Gradient Memories. | IEEE Trans. Neural Networks Learn. Syst. | 2022 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| Gradients Cannot Be Tamed: Behind the Impossible Paradox of Blocking Targeted Adversarial Attacks. | IEEE Trans. Neural Networks Learn. Syst. | 2021 | Link |
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| New Varying-Parameter ZNN Models With Finite-Time Convergence and Noise Suppression for Time-Varying Matrix Moore-Penrose Inversion. | IEEE Trans. Neural Networks Learn. Syst. | 2020 | Link |
2013
| Title | Venue | Year | Link |
|---|---|---|---|
| Common Nature of Learning Between Back-Propagation and Hopfield-Type Neural Networks for Generalized Matrix Inversion With Simplified Models. | IEEE Trans. Neural Networks Learn. Syst. | 2013 | Link |
IEEE Trans. Big Data
Expand IEEE Trans. Big Data
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Comprehensive Privacy Analysis on Recommendation With Causal Embedding Against Model Inversion Attacks. | IEEE Trans. Big Data | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Augmented Multi-Party Computation Against Gradient Leakage in Federated Learning. | IEEE Trans. Big Data | 2024 | Link |
| Improved Gradient Inversion Attacks and Defenses in Federated Learning. | IEEE Trans. Big Data | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| A Black-Box Adversarial Attack Method via Nesterov Accelerated Gradient and Rewiring Towards Attacking Graph Neural Networks. | IEEE Trans. Big Data | 2023 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| Leakage Resilient Leveled FHE on Multiple Bits Message. | IEEE Trans. Big Data | 2021 | Link |
IEEE Trans. Medical Imaging
Expand IEEE Trans. Medical Imaging
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Do Gradient Inversion Attacks Make Federated Learning Unsafe? | IEEE Trans. Medical Imaging | 2023 | Link |
| Ensemble Inversion for Brain Tumor Growth Models With Mass Effect. | IEEE Trans. Medical Imaging | 2023 | Link |
2016
| Title | Venue | Year | Link |
|---|---|---|---|
| Real-Time Model-Based Inversion in Cross-Sectional Optoacoustic Tomography. | IEEE Trans. Medical Imaging | 2016 | Link |
2015
| Title | Venue | Year | Link |
|---|---|---|---|
| Quantitative Susceptibility Mapping by Inversion of a Perturbation Field Model: Correlation With Brain Iron in Normal Aging. | IEEE Trans. Medical Imaging | 2015 | Link |
2014
| Title | Venue | Year | Link |
|---|---|---|---|
| Model Based Inversion for Deriving Maps of Histological Parameters Characteristic of Cancer From Ex-Vivo Multispectral Images of the Colon. | IEEE Trans. Medical Imaging | 2014 | Link |
2010
| Title | Venue | Year | Link |
|---|---|---|---|
| Fast Semi-Analytical Model-Based Acoustic Inversion for Quantitative Optoacoustic Tomography. | IEEE Trans. Medical Imaging | 2010 | Link |
IEEE Trans. Inf. Forensics Secur.
Expand IEEE Trans. Inf. Forensics Secur.
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Adv-Inversion: Stealthy Adversarial Attacks via GAN-Inversion for Facial Privacy Protection. | IEEE Trans. Inf. Forensics Secur. | 2025 | Link |
| Defending Against Model Inversion Attack via Feature Purification. | IEEE Trans. Inf. Forensics Secur. | 2025 | Link |
| Distributional Black-Box Model Inversion Attack With Multi-Agent Reinforcement Learning. | IEEE Trans. Inf. Forensics Secur. | 2025 | Link |
| Dual Dependency Disentangling for Defending Model Inversion Attacks in Split Federated Learning. | IEEE Trans. Inf. Forensics Secur. | 2025 | Link |
| Enabling Gradient Inversion Attack Against SplitFed Learning via L2 Norm Amplification. | IEEE Trans. Inf. Forensics Secur. | 2025 | Link |
| FGMIA: Feature-Guided Model Inversion Attacks Against Face Recognition Models. | IEEE Trans. Inf. Forensics Secur. | 2025 | Link |
| GI-NAS: Boosting Gradient Inversion Attacks Through Adaptive Neural Architecture Search. | IEEE Trans. Inf. Forensics Secur. | 2025 | Link |
| Gradient Inversion of Text-Modal Data in Distributed Learning. | IEEE Trans. Inf. Forensics Secur. | 2025 | Link |
| Query-Efficient Model Inversion Attacks: An Information Flow View. | IEEE Trans. Inf. Forensics Secur. | 2025 | Link |
| Recovering Reed-Solomon Codes Privately. | IEEE Trans. Inf. Forensics Secur. | 2025 | Link |
| Robust Token Gradient and Frequency-Aware Transferable Adversarial Attacks on Vision Transformers. | IEEE Trans. Inf. Forensics Secur. | 2025 | Link |
| Semantic and Precise Trigger Inversion: Detecting Backdoored Language Models. | IEEE Trans. Inf. Forensics Secur. | 2025 | Link |
| The Gradient Puppeteer: Adversarial Domination in Gradient Leakage Attacks Through Model Poisoning. | IEEE Trans. Inf. Forensics Secur. | 2025 | Link |
| TrapNet: Model Inversion Defense via Trapdoor. | IEEE Trans. Inf. Forensics Secur. | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing. | IEEE Trans. Inf. Forensics Secur. | 2024 | Link |
| Data Generation and Augmentation Method for Deep Learning-Based VDU Leakage Signal Restoration Algorithm. | IEEE Trans. Inf. Forensics Secur. | 2024 | Link |
| Gradient-Leaks: Enabling Black-Box Membership Inference Attacks Against Machine Learning Models. | IEEE Trans. Inf. Forensics Secur. | 2024 | Link |
| Inversion-Guided Defense: Detecting Model Stealing Attacks by Output Inverting. | IEEE Trans. Inf. Forensics Secur. | 2024 | Link |
| RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks. | IEEE Trans. Inf. Forensics Secur. | 2024 | Link |
| Unstoppable Attack: Label-Only Model Inversion Via Conditional Diffusion Model. | IEEE Trans. Inf. Forensics Secur. | 2024 | Link |
| Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion Attack. | IEEE Trans. Inf. Forensics Secur. | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| A GAN-Based Defense Framework Against Model Inversion Attacks. | IEEE Trans. Inf. Forensics Secur. | 2023 | Link |
| Analysis and Utilization of Hidden Information in Model Inversion Attacks. | IEEE Trans. Inf. Forensics Secur. | 2023 | Link |
| EGIA: An External Gradient Inversion Attack in Federated Learning. | IEEE Trans. Inf. Forensics Secur. | 2023 | Link |
| Label-Only Model Inversion Attacks: Attack With the Least Information. | IEEE Trans. Inf. Forensics Secur. | 2023 | Link |
| Privacy-Encoded Federated Learning Against Gradient-Based Data Reconstruction Attacks. | IEEE Trans. Inf. Forensics Secur. | 2023 | Link |
| Using Highly Compressed Gradients in Federated Learning for Data Reconstruction Attacks. | IEEE Trans. Inf. Forensics Secur. | 2023 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| Data Disclosure With Non-Zero Leakage and Non-Invertible Leakage Matrix. | IEEE Trans. Inf. Forensics Secur. | 2022 | Link |
| Gradient Leakage Attack Resilient Deep Learning. | IEEE Trans. Inf. Forensics Secur. | 2022 | Link |
| Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System. | IEEE Trans. Inf. Forensics Secur. | 2022 | Link |
2019
| Title | Venue | Year | Link |
|---|---|---|---|
| Impact of Prior Knowledge and Data Correlation on Privacy Leakage: A Unified Analysis. | IEEE Trans. Inf. Forensics Secur. | 2019 | Link |
2017
| Title | Venue | Year | Link |
|---|---|---|---|
| A Zero-Leakage Fuzzy Embedder From the Theoretical Formulation to Real Data. | IEEE Trans. Inf. Forensics Secur. | 2017 | Link |
| Optimized Quantization in Zero Leakage Helper Data Systems. | IEEE Trans. Inf. Forensics Secur. | 2017 | Link |
ACM Trans. Priv. Secur.
Expand ACM Trans. Priv. Secur.
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Quantifying and Exploiting Adversarial Vulnerability: Gradient-Based Input Pre-Filtering for Enhanced Performance in Black-Box Attacks. | ACM Trans. Priv. Secur. | 2025 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks. | ACM Trans. Priv. Secur. | 2023 | Link |
IEEE J. Biomed. Health Informatics
Expand IEEE J. Biomed. Health Informatics
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| E2EGI: End-to-End Gradient Inversion in Federated Learning. | IEEE J. Biomed. Health Informatics | 2023 | Link |
Medical Image Anal.
Expand Medical Image Anal.
2026
| Title | Venue | Year | Link |
|---|---|---|---|
| A novel gradient inversion attack framework to investigate privacy vulnerabilities during retinal image-based federated learning. | Medical Image Anal. | 2026 | Link |
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Shadow defense against gradient inversion attack in federated learning. | Medical Image Anal. | 2025 | Link |
Knowl. Based Syst.
Expand Knowl. Based Syst.
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Stand-in Model Protection: Synthetic defense for membership inference and model inversion attacks. | Knowl. Based Syst. | 2025 | Link |
| Subspectrum mixup-based adversarial attack and evading defenses by structure-enhanced gradient purification. | Knowl. Based Syst. | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| AGS: Transferable adversarial attack for person re-identification by adaptive gradient similarity attack. | Knowl. Based Syst. | 2024 | Link |
| Defending against gradient inversion attacks in federated learning via statistical machine unlearning. | Knowl. Based Syst. | 2024 | Link |
| Spatial-frequency gradient fusion based model augmentation for high transferability adversarial attack. | Knowl. Based Syst. | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| MP-CLF: An effective Model-Preserving Collaborative deep Learning Framework for mitigating data leakage under the GAN. | Knowl. Based Syst. | 2023 | Link |
2017
| Title | Venue | Year | Link |
|---|---|---|---|
| Data leakage detection algorithm based on task sequences and probabilities. | Knowl. Based Syst. | 2017 | Link |
Neurocomputing
Expand Neurocomputing
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Exploiting the connections between images and deep feature vectors in model inversion attacks. | Neurocomputing | 2025 | Link |
| Label-only model inversion attacks: Adaptive boundary exclusion for limited queries. | Neurocomputing | 2025 | Link |
| Momentum gradient-based untargeted poisoning attack on hypergraph neural networks. | Neurocomputing | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Adaptive Gradient-based Word Saliency for adversarial text attacks. | Neurocomputing | 2024 | Link |
| Improved gradient leakage attack against compressed gradients in federated learning. | Neurocomputing | 2024 | Link |
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| Modified gradient neural networks for solving the time-varying Sylvester equation with adaptive coefficients and elimination of matrix inversion. | Neurocomputing | 2020 | Link |
| New error function designs for finite-time ZNN models with application to dynamic matrix inversion. | Neurocomputing | 2020 | Link |
2015
| Title | Venue | Year | Link |
|---|---|---|---|
| On sampled-data control for stabilization of genetic regulatory networks with leakage delays. | Neurocomputing | 2015 | Link |
IEEE Trans. Knowl. Data Eng.
Expand IEEE Trans. Knowl. Data Eng.
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Practical Equi-Join Over Encrypted Database With Reduced Leakage. | IEEE Trans. Knowl. Data Eng. | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| On Data Distribution Leakage in Cross-Silo Federated Learning. | IEEE Trans. Knowl. Data Eng. | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Model Inversion Attacks Against Graph Neural Networks. | IEEE Trans. Knowl. Data Eng. | 2023 | Link |
| Reveal Your Images: Gradient Leakage Attack Against Unbiased Sampling-Based Secure Aggregation. | IEEE Trans. Knowl. Data Eng. | 2023 | Link |
| Time-Aware Gradient Attack on Dynamic Network Link Prediction. | IEEE Trans. Knowl. Data Eng. | 2023 | Link |
2011
| Title | Venue | Year | Link |
|---|---|---|---|
| Data Leakage Detection. | IEEE Trans. Knowl. Data Eng. | 2011 | Link |
IEEE Trans. Syst. Man Cybern. Syst.
Expand IEEE Trans. Syst. Man Cybern. Syst.
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Adversarial Attacks on Regression Systems via Gradient Optimization. | IEEE Trans. Syst. Man Cybern. Syst. | 2023 | Link |
| Social IoT Approach to Cyber Defense of a Deep-Learning-Based Recognition System in Front of Media Clones Generated by Model Inversion Attack. | IEEE Trans. Syst. Man Cybern. Syst. | 2023 | Link |
IEEE Trans. Emerg. Top. Comput.
Expand IEEE Trans. Emerg. Top. Comput.
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs. | IEEE Trans. Emerg. Top. Comput. | 2023 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks. | IEEE Trans. Emerg. Top. Comput. | 2022 | Link |
Neural Networks
Expand Neural Networks
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Aligning the domains in cross domain model inversion attack. | Neural Networks | 2024 | Link |
| Structural prior-driven feature extraction with gradient-momentum combined optimization for convolutional neural network image classification. | Neural Networks | 2024 | Link |
2019
| Title | Venue | Year | Link |
|---|---|---|---|
| A new noise-tolerant and predefined-time ZNN model for time-dependent matrix inversion. | Neural Networks | 2019 | Link |
2007
| Title | Venue | Year | Link |
|---|---|---|---|
| Model inversion by parameter fit using NN emulating the forward model - Evaluation of indirect measurements. | Neural Networks | 2007 | Link |
J. Artif. Intell. Res.
Expand J. Artif. Intell. Res.
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Detecting Generative Model Inversion Attacks for Protecting Intellectual Property of Deep Neural Networks. | J. Artif. Intell. Res. | 2025 | Link |
IEEE Trans. Image Process.
Expand IEEE Trans. Image Process.
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| Gradient-Based Feature Extraction From Raw Bayer Pattern Images. | IEEE Trans. Image Process. | 2021 | Link |
2003
| Title | Venue | Year | Link |
|---|---|---|---|
| A local spectral inversion of a linearized TV model for denoising and deblurring. | IEEE Trans. Image Process. | 2003 | Link |
1992
| Title | Venue | Year | Link |
|---|---|---|---|
| A system model and inversion for synthetic aperture radar imaging. | IEEE Trans. Image Process. | 1992 | Link |
IEEE Trans. Neural Networks
Expand IEEE Trans. Neural Networks
2005
| Title | Venue | Year | Link |
|---|---|---|---|
| Design and analysis of a general recurrent neural network model for time-varying matrix inversion. | IEEE Trans. Neural Networks | 2005 | Link |
IEEE Trans. Intell. Transp. Syst.
Expand IEEE Trans. Intell. Transp. Syst.
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| Optimal Trajectory Planning and Robust Tracking Using Vehicle Model Inversion. | IEEE Trans. Intell. Transp. Syst. | 2022 | Link |
Expert Syst. Appl.
Expand Expert Syst. Appl.
2026
| Title | Venue | Year | Link |
|---|---|---|---|
| ExSGD: Exploiting previous gradient for distributed large-batch training of building extraction network. | Expert Syst. Appl. | 2026 | Link |
| FMGHA: Future momentum gradient-based attack on hypergraph neural networks. | Expert Syst. Appl. | 2026 | Link |
| Transferable and defense-aware dual-objective meta gradient memory attack against deepfake generation. | Expert Syst. Appl. | 2026 | Link |
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| ILAMP: Improved text extraction from gradients in federated learning using language model priors and sequence beam search. | Expert Syst. Appl. | 2025 | Link |
| Uni-3DAD: Gan-inversion aided universal 3D anomaly detection on model-free products. | Expert Syst. Appl. | 2025 | Link |
| You cannot handle the weather: Progressive amplified adverse-weather-gradient projection adversarial attack. | Expert Syst. Appl. | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| AGD-GAN: Adaptive Gradient-Guided and Depth-supervised generative adversarial networks for ancient mural sketch extraction. | Expert Syst. Appl. | 2024 | Link |
| Fixed-time convergence ZNN model for solving rectangular dynamic full-rank matrices inversion. | Expert Syst. Appl. | 2024 | Link |
| Securecipher: An instantaneous synchronization stream encryption system for insider threat data leakage protection. | Expert Syst. Appl. | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability. | Expert Syst. Appl. | 2023 | Link |
| Opt-TCAE: Optimal temporal convolutional auto-encoder for boiler tube leakage detection in a thermal power plant using multi-sensor data. | Expert Syst. Appl. | 2023 | Link |
2016
| Title | Venue | Year | Link |
|---|---|---|---|
| Ridders algorithm in approximate inversion of fuzzy model with parametrized consequences. | Expert Syst. Appl. | 2016 | Link |
2014
| Title | Venue | Year | Link |
|---|---|---|---|
| Inversion mechanism with functional extrema model for identification incommensurate and hyper fractional chaos via differential evolution. | Expert Syst. Appl. | 2014 | Link |
IEEE ACM Trans. Audio Speech Lang. Process.
Expand IEEE ACM Trans. Audio Speech Lang. Process.
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| Acoustic-to-Articulatory Mapping With Joint Optimization of Deep Speech Enhancement and Articulatory Inversion Models. | IEEE ACM Trans. Audio Speech Lang. Process. | 2022 | Link |
IEEE Trans. Speech Audio Process.
Expand IEEE Trans. Speech Audio Process.
2013
| Title | Venue | Year | Link |
|---|---|---|---|
| Model-Based Inversion of Dynamic Range Compression. | IEEE Trans. Speech Audio Process. | 2013 | Link |
Neural Comput. Appl.
Expand Neural Comput. Appl.
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Integrated gradients-based defense against adversarial word substitution attacks. | Neural Comput. Appl. | 2025 | Link |
2016
| Title | Venue | Year | Link |
|---|---|---|---|
| The stabilization of BAM neural networks with time-varying delays in the leakage terms via sampled-data control. | Neural Comput. Appl. | 2016 | Link |
2012
| Title | Venue | Year | Link |
|---|---|---|---|
| A novel neural-based model for acoustic-articulatory inversion mapping. | Neural Comput. Appl. | 2012 | Link |
ICDE
Expand ICDE
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| LDPRecover: Recovering Frequencies from Poisoning Attacks Against Local Differential Privacy. | ICDE | 2024 | Link |
| Secure Normal Form: Mediation Among Cross Cryptographic Leakages in Encrypted Databases. | ICDE | 2024 | Link |
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs. | ICDE | 2020 | Link |
2009
| Title | Venue | Year | Link |
|---|---|---|---|
| A Model for Data Leakage Detection. | ICDE | 2009 | Link |
2005
| Title | Venue | Year | Link |
|---|---|---|---|
| XGuard: A System for Publishing XML Documents without Information Leakage in the Presence of Data Inference. | ICDE | 2005 | Link |
MobiCom
Expand MobiCom
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| A Black-Box Approach for Quantifying Leakage of Trace-Based Correlated Data. | MobiCom | 2024 | Link |
IEEE Symposium on Security and Privacy
Expand IEEE Symposium on Security and Privacy
2019
| Title | Venue | Year | Link |
|---|---|---|---|
| Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage. | IEEE Symposium on Security and Privacy | 2019 | Link |
| Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps. | IEEE Symposium on Security and Privacy | 2019 | Link |
2018
| Title | Venue | Year | Link |
|---|---|---|---|
| Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. | IEEE Symposium on Security and Privacy | 2018 | Link |
CollSec
Expand CollSec
2010
| Title | Venue | Year | Link |
|---|---|---|---|
| Analyzing Group Communication for Preventing Accidental Data Leakage via Email. | CollSec | 2010 | Link |
Proc. ACM Manag. Data
Expand Proc. ACM Manag. Data
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| Counterfactual Explanation at Will, with Zero Privacy Leakage. | Proc. ACM Manag. Data | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| RLS Side Channels: Investigating Leakage of Row-Level Security Protected Data Through Query Execution Time. | Proc. ACM Manag. Data | 2023 | Link |
ICSE Companion
Expand ICSE Companion
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| CODEMORPH: Mitigating Data Leakage in Large Language Model Assessment. | ICSE Companion | 2025 | Link |
CIKM
Expand CIKM
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| Are Gradients on Graph Structure Reliable in Gray-box Attacks? | CIKM | 2022 | Link |
2005
| Title | Venue | Year | Link |
|---|---|---|---|
| Privacy leakage in multi-relational databases via pattern based semi-supervised learning. | CIKM | 2005 | Link |
ACM Trans. Intell. Syst. Technol.
Expand ACM Trans. Intell. Syst. Technol.
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| GRNN: Generative Regression Neural Network - A Data Leakage Attack for Federated Learning. | ACM Trans. Intell. Syst. Technol. | 2022 | Link |
ACM Trans. Knowl. Discov. Data
Expand ACM Trans. Knowl. Discov. Data
2012
| Title | Venue | Year | Link |
|---|---|---|---|
| Leakage in data mining: Formulation, detection, and avoidance. | ACM Trans. Knowl. Discov. Data | 2012 | Link |
Proc. VLDB Endow.
Expand Proc. VLDB Endow.
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores. | Proc. VLDB Endow. | 2024 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| Don't Be a Tattle-Tale: Preventing Leakages through Data Dependencies on Access Control Protected Data. | Proc. VLDB Endow. | 2022 | Link |
2018
| Title | Venue | Year | Link |
|---|---|---|---|
| ConTPL: Controlling Temporal Privacy Leakage in Differentially Private Continuous Data Release. | Proc. VLDB Endow. | 2018 | Link |
IEEE Trans. Parallel Distributed Syst.
Expand IEEE Trans. Parallel Distributed Syst.
2013
| Title | Venue | Year | Link |
|---|---|---|---|
| A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud. | IEEE Trans. Parallel Distributed Syst. | 2013 | Link |
1990
| Title | Venue | Year | Link |
|---|---|---|---|
| Error Recovery in Shared Memory Multiprocessors Using Private Caches. | IEEE Trans. Parallel Distributed Syst. | 1990 | Link |
Pattern Recognit.
Expand Pattern Recognit.
2026
| Title | Venue | Year | Link |
|---|---|---|---|
| Global aggregated gradient-guided adversarial attacks for person re-identification. | Pattern Recognit. | 2026 | Link |
| SemiSketch: An ancient mural sketch extraction network based on reference prior and gradient frequency compensation. | Pattern Recognit. | 2026 | Link |
| Staircase Sign Method: Boosting adversarial attacks by mitigating gradient distortion. | Pattern Recognit. | 2026 | Link |
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Gradient-based sparse voxel attacks on point cloud object detection. | Pattern Recognit. | 2025 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| A Learnable Gradient operator for face presentation attack detection. | Pattern Recognit. | 2023 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| Practical protection against video data leakage via universal adversarial head. | Pattern Recognit. | 2022 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| AG3line: Active grouping and geometry-gradient combined validation for fast line segment extraction. | Pattern Recognit. | 2021 | Link |
2013
| Title | Venue | Year | Link |
|---|---|---|---|
| Rotation invariant textural feature extraction for image retrieval using eigen value analysis of intensity gradients and multi-resolution analysis. | Pattern Recognit. | 2013 | Link |
2003
| Title | Venue | Year | Link |
|---|---|---|---|
| Gradient feature extraction for classification-based face detection. | Pattern Recognit. | 2003 | Link |
1996
| Title | Venue | Year | Link |
|---|---|---|---|
| Extracting facial features by an inhibitory mechanism based on gradient distributions. | Pattern Recognit. | 1996 | Link |
Inf. Sci.
Expand Inf. Sci.
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| Graph neural networks adversarial attacks based on node gradient and importance score. | Inf. Sci. | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| GradDiff: Gradient-based membership inference attacks against federated distillation with differential comparison. | Inf. Sci. | 2024 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| Improving adversarial attacks on deep neural networks via constricted gradient-based perturbations. | Inf. Sci. | 2021 | Link |
| Target attack on biomedical image segmentation model based on multi-scale gradients. | Inf. Sci. | 2021 | Link |
2017
| Title | Venue | Year | Link |
|---|---|---|---|
| Local gradient patterns (LGP): An effective local-statistical-feature extraction scheme for no-reference image quality assessment. | Inf. Sci. | 2017 | Link |
2014
| Title | Venue | Year | Link |
|---|---|---|---|
| CoBAn: A context based model for data leakage prevention. | Inf. Sci. | 2014 | Link |
IEEE Trans. Signal Process.
Expand IEEE Trans. Signal Process.
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Secure Distributed Optimization Under Gradient Attacks. | IEEE Trans. Signal Process. | 2023 | Link |
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| Federated Variance-Reduced Stochastic Gradient Descent With Robustness to Byzantine Attacks. | IEEE Trans. Signal Process. | 2020 | Link |
2019
| Title | Venue | Year | Link |
|---|---|---|---|
| Distributed Gradient Descent Algorithm Robust to an Arbitrary Number of Byzantine Attackers. | IEEE Trans. Signal Process. | 2019 | Link |
| Gradient Algorithms for Complex Non-Gaussian Independent Component/Vector Extraction, Question of Convergence. | IEEE Trans. Signal Process. | 2019 | Link |
IEEE Trans. Cybern.
Expand IEEE Trans. Cybern.
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Deep Cascade Gradient RBF Networks With Output-Relevant Feature Extraction and Adaptation for Nonlinear and Nonstationary Processes. | IEEE Trans. Cybern. | 2023 | Link |
Pattern Recognit. Lett.
Expand Pattern Recognit. Lett.
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| Perturbation analysis of gradient-based adversarial attacks. | Pattern Recognit. Lett. | 2020 | Link |
2015
| Title | Venue | Year | Link |
|---|---|---|---|
| Gradient operators for feature extraction from omnidirectional panoramic images. | Pattern Recognit. Lett. | 2015 | Link |
2013
| Title | Venue | Year | Link |
|---|---|---|---|
| Object extraction from T2 weighted brain MR image using histogram based gradient calculation. | Pattern Recognit. Lett. | 2013 | Link |
2010
| Title | Venue | Year | Link |
|---|---|---|---|
| Gradient operators for feature extraction and characterisation in range images. | Pattern Recognit. Lett. | 2010 | Link |
2008
| Title | Venue | Year | Link |
|---|---|---|---|
| Boundary extraction of linear features using dual paths through gradient profiles. | Pattern Recognit. Lett. | 2008 | Link |
| Gradient-based local affine invariant feature extraction for mobile robot localization in indoor environments. | Pattern Recognit. Lett. | 2008 | Link |
ACM Trans. Inf. Syst. Secur.
Expand ACM Trans. Inf. Syst. Secur.
2004
| Title | Venue | Year | Link |
|---|---|---|---|
| A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). | ACM Trans. Inf. Syst. Secur. | 2004 | Link |
INFOCOM
Expand INFOCOM
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| VaniKG: Vanishing Key Gradient Attack and Defense for Robust Federated Aggregation. | INFOCOM | 2025 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients. | INFOCOM | 2023 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| Protect Privacy from Gradient Leakage Attack in Federated Learning. | INFOCOM | 2022 | Link |
Mach. Learn.
Expand Mach. Learn.
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| HFIA: a parasitic feature inference attack and gradient-based defense strategy in SplitNN-based vertical federated learning. | Mach. Learn. | 2025 | Link |
Int. J. Comput. Vis.
Expand Int. J. Comput. Vis.
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| Scaling up the Randomized Gradient-Free Adversarial Attack Reveals Overestimation of Robustness Using Established Attacks. | Int. J. Comput. Vis. | 2020 | Link |
Comput. Vis. Image Underst.
Expand Comput. Vis. Image Underst.
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| Improving the robustness of adversarial attacks using an affine-invariant gradient estimator. | Comput. Vis. Image Underst. | 2023 | Link |
arXiv
Expand arXiv
2026
| Title | Venue | Year | Link |
|---|---|---|---|
| A $q$-Polymatroid Framework for Information Leakage in Secure Linear Network Coding | arXiv | 2026 | Link |
| A Calibrated Memorization Index (MI) for Detecting Training Data Leakage in Generative MRI Models | arXiv | 2026 | Link |
| A Novel Transfer Learning Approach for Mental Stability Classification from Voice Signal | arXiv | 2026 | Link |
| A Real-Time Privacy-Preserving Behavior Recognition System via Edge-Cloud Collaboration | arXiv | 2026 | Link |
| A Secure and Private Distributed Bayesian Federated Learning Design | arXiv | 2026 | Link |
| A Unified Masked Jigsaw Puzzle Framework for Vision and Language Models | arXiv | 2026 | Link |
| A joint diffusion approach to multi-modal inference in inertial confinement fusion | arXiv | 2026 | Link |
| AI Generated Text Detection | arXiv | 2026 | Link |
| Adaptive Attribute-Decoupled Encryption for Trusted Respiratory Monitoring in Resource-Limited Consumer Healthcare | arXiv | 2026 | Link |
| Aegis: Towards Governance, Integrity, and Security of AI Voice Agents | arXiv | 2026 | Link |
| AgentLeak: A Full-Stack Benchmark for Privacy Leakage in Multi-Agent LLM Systems | arXiv | 2026 | Link |
| Anonymization-Enhanced Privacy Protection for Mobile GUI Agents: Available but Invisible | arXiv | 2026 | Link |
| Automated Disentangling Analysis of Skin Colour for Lesion Images | arXiv | 2026 | Link |
| Benchmark Leakage Trap: Can We Trust LLM-based Recommendation? | arXiv | 2026 | Link |
| Benchmarking Knowledge-Extraction Attack and Defense on Retrieval-Augmented Generation | arXiv | 2026 | Link |
| Beyond Perfect Scores: Proof-by-Contradiction for Trustworthy Machine Learning | arXiv | 2026 | Link |
| BioPulse-QA: A Dynamic Biomedical Question-Answering Benchmark for Evaluating Factuality, Robustness, and Bias in Large Language Models | arXiv | 2026 | Link |
| Breaking Semantic-Aware Watermarks via LLM-Guided Coherence-Preserving Semantic Injection | arXiv | 2026 | Link |
| Burn-After-Use for Preventing Data Leakage through a Secure Multi-Tenant Architecture in Enterprise LLM | arXiv | 2026 | Link |
| CSSBench: Evaluating the Safety of Lightweight LLMs against Chinese-Specific Adversarial Patterns | arXiv | 2026 | Link |
| Can 3D point cloud data improve automated body condition score prediction in dairy cattle? | arXiv | 2026 | Link |
| CanaryBench: Stress Testing Privacy Leakage in Cluster-Level Conversation Summaries | arXiv | 2026 | Link |
| Clinical-Prior Guided Multi-Modal Learning with Latent Attention Pooling for Gait-Based Scoliosis Screening | arXiv | 2026 | Link |
| Concept-Aware Privacy Mechanisms for Defending Embedding Inversion Attacks | arXiv | 2026 | Link |
| Converse Bounds for Sun-Jafar-type Weak Private Information Retrieval | arXiv | 2026 | Link |
| Cross-reality Location Privacy Protection in 6G-enabled Vehicular Metaverses: An LLM-enhanced Hybrid Generative Diffusion Model-based Approach | arXiv | 2026 | Link |
| Cycling Race Time Prediction: A Personalized Machine Learning Approach Using Route Topology and Training Load | arXiv | 2026 | Link |
| DNATokenizer: A GPU-First Byte-to-Identifier Tokenizer for High-Throughput DNA Language Models | arXiv | 2026 | Link |
| Data-Free Privacy-Preserving for LLMs via Model Inversion and Selective Unlearning | arXiv | 2026 | Link |
| Decentralized Identity in Practice: Benchmarking Latency, Cost, and Privacy | arXiv | 2026 | Link |
| Detecting Cybersecurity Threats by Integrating Explainable AI with SHAP Interpretability and Strategic Data Sampling | arXiv | 2026 | Link |
| Detecting High-Potential SMEs with Heterogeneous Graph Neural Networks | arXiv | 2026 | Link |
| Differential Privacy Image Generation with Reconstruction Loss and Noise Injection Using an Error Feedback SGD | arXiv | 2026 | Link |
| Disentangled Representation Learning via Flow Matching | arXiv | 2026 | Link |
| ELSA: Efficient LLM-Centric Split Aggregation for Privacy-Aware Hierarchical Federated Learning over Resource-Constrained Edge Networks | arXiv | 2026 | Link |
| ERIS: Enhancing Privacy and Communication Efficiency in Serverless Federated Learning | arXiv | 2026 | Link |
| Efficient Privacy-Preserving Retrieval Augmented Generation with Distance-Preserving Encryption | arXiv | 2026 | Link |
| Enhancing Multi-Image Understanding through Delimiter Token Scaling | arXiv | 2026 | Link |
| Explanations Leak: Membership Inference with Differential Privacy and Active Learning Defense | arXiv | 2026 | Link |
| Exploring Approaches for Detecting Memorization of Recommender System Data in Large Language Models | arXiv | 2026 | Link |
| FCMBench: A Comprehensive Financial Credit Multimodal Benchmark for Real-world Applications | arXiv | 2026 | Link |
| FeatureBench: Benchmarking Agentic Coding for Complex Feature Development | arXiv | 2026 | Link |
| FedCARE: Federated Unlearning with Conflict-Aware Projection and Relearning-Resistant Recovery | arXiv | 2026 | Link |
| Finding Connections: Membership Inference Attacks for the Multi-Table Synthetic Data Setting | arXiv | 2026 | Link |
| From Data Leak to Secret Misses: The Impact of Data Leakage on Secret Detection Models | arXiv | 2026 | Link |
| Gradient Networks for Universal Magnetic Modeling of Synchronous Machines | arXiv | 2026 | Link |
| Guarding the Middle: Protecting Intermediate Representations in Federated Split Learning | arXiv | 2026 | Link |
| HearSay Benchmark: Do Audio LLMs Leak What They Hear? | arXiv | 2026 | Link |
| Helper-Assisted Coding for Gaussian Wiretap Channels: Deep Learning Meets PhySec | arXiv | 2026 | Link |
| How Entanglement Reshapes the Geometry of Quantum Differential Privacy | arXiv | 2026 | Link |
| How does Graph Structure Modulate Membership-Inference Risk for Graph Neural Networks? | arXiv | 2026 | Link |
| Hybrid Federated and Split Learning for Privacy Preserving Clinical Prediction and Treatment Optimization | arXiv | 2026 | Link |
| IM-Animation: An Implicit Motion Representation for Identity-decoupled Character Animation | arXiv | 2026 | Link |
| IU-GUARD: Privacy-Preserving Spectrum Coordination for Incumbent Users under Dynamic Spectrum Sharing | arXiv | 2026 | Link |
| Inference Attacks Against Graph Generative Diffusion Models | arXiv | 2026 | Link |
| Invisible Walls: Privacy-Preserving ISAC Empowered by Reconfigurable Intelligent Surfaces | arXiv | 2026 | Link |
| It's TIME: Towards the Next Generation of Time Series Forecasting Benchmarks | arXiv | 2026 | Link |
| Know Thy Enemy: Securing LLMs Against Prompt Injection via Diverse Data Synthesis and Instruction-Level Chain-of-Thought Learning | arXiv | 2026 | Link |
| Knowledge Vector Weakening: Efficient Training-free Unlearning for Large Vision-Language Models | arXiv | 2026 | Link |
| Language Model Inversion through End-to-End Differentiation | arXiv | 2026 | Link |
| Laser interferometry as a robust neuromorphic platform for machine learning | arXiv | 2026 | Link |
| Learning to Collaborate: An Orchestrated-Decentralized Framework for Peer-to-Peer LLM Federation | arXiv | 2026 | Link |
| Leveraging Membership Inference Attacks for Privacy Measurement in Federated Learning for Remote Sensing Images | arXiv | 2026 | Link |
| Local Layer-wise Differential Privacy in Federated Learning | arXiv | 2026 | Link |
| LocationAgent: A Hierarchical Agent for Image Geolocation via Decoupling Strategy and Evidence from Parametric Knowledge | arXiv | 2026 | Link |
| Long Context, Less Focus: A Scaling Gap in LLMs Revealed through Privacy and Personalization | arXiv | 2026 | Link |
| Machine Unlearning in Low-Dimensional Feature Subspace | arXiv | 2026 | Link |
| Membership Inference Attacks Against Fine-tuned Diffusion Language Models | arXiv | 2026 | Link |
| Memorization Dynamics in Knowledge Distillation for Language Models | arXiv | 2026 | Link |
| Mind the GAP: Text Safety Does Not Transfer to Tool-Call Safety in LLM Agents | arXiv | 2026 | Link |
| Mitigating Gradient Inversion Risks in Language Models via Token Obfuscation | arXiv | 2026 | Link |
| Multi-Scale Global-Instance Prompt Tuning for Continual Test-time Adaptation in Medical Image Segmentation | arXiv | 2026 | Link |
| NMRGym: A Comprehensive Benchmark for Nuclear Magnetic Resonance Based Molecular Structure Elucidation | arXiv | 2026 | Link |
| NiMark: A Non-intrusive Watermarking Framework against Screen-shooting Attacks | arXiv | 2026 | Link |
| Non-Invasive Anemia Detection: A Multichannel PPG-Based Hemoglobin Estimation with Explainable Artificial Intelligence | arXiv | 2026 | Link |
| OMNI-LEAK: Orchestrator Multi-Agent Network Induced Data Leakage | arXiv | 2026 | Link |
| Odd Radio Circles Modeled by Shock-Bubble Interactions | arXiv | 2026 | Link |
| OmniCode: A Benchmark for Evaluating Software Engineering Agents | arXiv | 2026 | Link |
| On the Evaluation Protocol of Gesture Recognition for UAV-based Rescue Operation based on Deep Learning: A Subject-Independence Perspective | arXiv | 2026 | Link |
| On the Information Leakage Envelope of the Gaussian Mechanism | arXiv | 2026 | Link |
| Optimal Real-Time Fusion of Time-Series Data Under Rényi Differential Privacy | arXiv | 2026 | Link |
| Orthogonalized Multimodal Contrastive Learning with Asymmetric Masking for Structured Representations | arXiv | 2026 | Link |
| Parallel Collaborative ADMM Privacy Computing and Adaptive GPU Acceleration for Distributed Edge Networks | arXiv | 2026 | Link |
| Parameter Privacy-Preserving Data Sharing: A Particle-Belief MDP Formulation | arXiv | 2026 | Link |
| Path-OED for infinite-dimensional Bayesian linear inverse problems governed by PDEs | arXiv | 2026 | Link |
| Pervasive Vulnerability Analysis and Defense for QKD-based Quantum Private Query | arXiv | 2026 | Link |
| Physically Consistent Machine Learning for Melting Temperature Prediction of Refractory High-Entropy Alloys | arXiv | 2026 | Link |
| Physics-Informed Neural Networks for Viscoacoustic Wave Propagation: Forward Modelling, Inversion and Discretization Sensitivity | arXiv | 2026 | Link |
| Predicting Mortgage Default with Machine Learning: AutoML, Class Imbalance, and Leakage Control | arXiv | 2026 | Link |
| PriMod4AI: Lifecycle-Aware Privacy Threat Modeling for AI Systems using LLM | arXiv | 2026 | Link |
| Prior Aware Memorization: An Efficient Metric for Distinguishing Memorization from Generalization in Large Language Models | arXiv | 2026 | Link |
| Privacy-Aware Split Inference with Speculative Decoding for Large Language Models over Wide-Area Networks | arXiv | 2026 | Link |
| Privacy-Concealing Cooperative Perception for BEV Scene Segmentation | arXiv | 2026 | Link |
| Privacy-Preserving Model Transcription with Differentially Private Synthetic Distillation | arXiv | 2026 | Link |
| Privacy-Utility Trade-offs Under Multi-Level Point-Wise Leakage Constraints | arXiv | 2026 | Link |
| Private Links, Public Leaks: Consequences of Frictionless User Experience on the Security and Privacy Posture of SMS-Delivered URLs | arXiv | 2026 | Link |
| Proactive Coded Caching Scheme for D2D Networks | arXiv | 2026 | Link |
| Proof of Reasoning for Privacy Enhanced Federated Blockchain Learning at the Edge | arXiv | 2026 | Link |
| Quantum key distribution without authentication and information leakage | arXiv | 2026 | Link |
| Radiomics in Medical Imaging: Methods, Applications, and Challenges | arXiv | 2026 | Link |
| Realistic Face Reconstruction from Facial Embeddings via Diffusion Models | arXiv | 2026 | Link |
| Reconstructing Training Data from Adapter-based Federated Large Language Models | arXiv | 2026 | Link |
| Res-MIA: A Training-Free Resolution-Based Membership Inference Attack on Federated Learning Models | arXiv | 2026 | Link |
| Retrieval Pivot Attacks in Hybrid RAG: Measuring and Mitigating Amplified Leakage from Vector Seeds to Graph Expansion | arXiv | 2026 | Link |
| Robust Distributed Nonconvex Optimization Enabling Communication Acceleration and Privacy Protection | arXiv | 2026 | Link |
| Robust Federated Learning via Byzantine Filtering over Encrypted Updates | arXiv | 2026 | Link |
| Robust Privacy: Inference-Time Privacy through Certified Robustness | arXiv | 2026 | Link |
| Rolling Element Bearing Fault Detection and Diagnosis with One-Dimensional Convolutional Neural Network | arXiv | 2026 | Link |
| SAFE: Secure and Accurate Federated Learning for Privacy-Preserving Brain-Computer Interfaces | arXiv | 2026 | Link |
| SPOILER-GUARD: Gating Latency Effects of Memory Accesses through Randomized Dependency Prediction | arXiv | 2026 | Link |
| SSI-DM: Singularity Skipping Inversion of Diffusion Models | arXiv | 2026 | Link |
| SWE-AGI: Benchmarking Specification-Driven Software Construction with MoonBit in the Era of Autonomous Agents | arXiv | 2026 | Link |
| SafeGPT: Preventing Data Leakage and Unethical Outputs in Enterprise LLM Use | arXiv | 2026 | Link |
| Secure Communications, Sensing, and Computing Towards Next-Generation Networks | arXiv | 2026 | Link |
| SecureGate: Learning When to Reveal PII Safely via Token-Gated Dual-Adapters for Federated LLMs | arXiv | 2026 | Link |
| Self-Guard: Defending Large Reasoning Models via enhanced self-reflection | arXiv | 2026 | Link |
| Sparse Point-wise Privacy Leakage: Mechanism Design and Fundamental Limits | arXiv | 2026 | Link |
| SpooFL: Spoofing Federated Learning | arXiv | 2026 | Link |
| Stop Testing Attacks, Start Diagnosing Defenses: The Four-Checkpoint Framework Reveals Where LLM Safety Breaks | arXiv | 2026 | Link |
| Stream-Voice-Anon: Enhancing Utility of Real-Time Speaker Anonymization via Neural Audio Codec and Language Models | arXiv | 2026 | Link |
| Synapse Compendium Aware Federated Knowledge Exchange for Tool Routed LLMs | arXiv | 2026 | Link |
| TAAM:Inductive Graph-Class Incremental Learning with Task-Aware Adaptive Modulation | arXiv | 2026 | Link |
| TAPM-Net: Trajectory-Aware Perturbation Modeling for Infrared Small Target Detection | arXiv | 2026 | Link |
| TIP: Resisting Gradient Inversion via Targeted Interpretable Perturbation in Federated Learning | arXiv | 2026 | Link |
| TM-RUGPULL: A Temporary Sound, Multimodal Dataset for Early Detection of RUG Pulls Across the Tokenized Ecosystem | arXiv | 2026 | Link |
| Taipan: A Query-free Transfer-based Multiple Sensitive Attribute Inference Attack Solely from Publicly Released Graphs | arXiv | 2026 | Link |
| TeachBench: A Syllabus-Grounded Framework for Evaluating Teaching Ability in Large Language Models | arXiv | 2026 | Link |
| The CoinAlg Bind: Profitability-Fairness Tradeoffs in Collective Investment Algorithms | arXiv | 2026 | Link |
| Towards Privacy-Preserving Mental Health Support with Large Language Models | arXiv | 2026 | Link |
| Towards Realistic Remote Sensing Dataset Distillation with Discriminative Prototype-guided Diffusion | arXiv | 2026 | Link |
| UniForce: A Unified Latent Force Model for Robot Manipulation with Diverse Tactile Sensors | arXiv | 2026 | Link |
| United We Defend: Collaborative Membership Inference Defenses in Federated Learning | arXiv | 2026 | Link |
| VLA-JEPA: Enhancing Vision-Language-Action Model with Latent World Model | arXiv | 2026 | Link |
| VQ-Style: Disentangling Style and Content in Motion with Residual Quantized Representations | arXiv | 2026 | Link |
| VeriTaS: The First Dynamic Benchmark for Multimodal Automated Fact-Checking | arXiv | 2026 | Link |
| When Evaluation Becomes a Side Channel: Regime Leakage and Structural Mitigations for Alignment Assessment | arXiv | 2026 | Link |
| When Is Distributed Nonlinear Aggregation Private? Optimality and Information-Theoretical Bounds | arXiv | 2026 | Link |
| Zero2Text: Zero-Training Cross-Domain Inversion Attacks on Textual Embeddings | arXiv | 2026 | Link |
| [Re] Benchmarking LLM Capabilities in Negotiation through Scoreable Games | arXiv | 2026 | Link |
2025
| Title | Venue | Year | Link |
|---|---|---|---|
| $α$-leakage Interpretation of Rényi Capacity | arXiv | 2025 | Link |
| (Token-Level) InfoRMIA: Stronger Membership Inference and Memorization Assessment for LLMs | arXiv | 2025 | Link |
| 1-2-3 Check: Enhancing Contextual Privacy in LLM via Multi-Agent Reasoning | arXiv | 2025 | Link |
| A Causality-aware Paradigm for Evaluating Creativity of Multimodal Large Language Models | arXiv | 2025 | Link |
| A Contrastive Federated Semi-Supervised Learning Intrusion Detection Framework for Internet of Robotic Things | arXiv | 2025 | Link |
| A Datagram Extension to DNS over QUIC: Proven Resource Conservation in the Internet of Things | arXiv | 2025 | Link |
| A False Sense of Privacy: Evaluating Textual Data Sanitization Beyond Surface-level Privacy Leakage | arXiv | 2025 | Link |
| A Framework to Prevent Biometric Data Leakage in the Immersive Technologies Domain | arXiv | 2025 | Link |
| A Leakage-Aware Data Layer For Student Analytics: The Capire Framework For Multilevel Trajectory Modeling | arXiv | 2025 | Link |
| A Metabolic-Imaging Integrated Model for Prognostic Prediction in Colorectal Liver Metastases | arXiv | 2025 | Link |
| A Model-agnostic Strategy to Mitigate Embedding Degradation in Personalized Federated Recommendation | arXiv | 2025 | Link |
| A New One-Shot Federated Learning Framework for Medical Imaging Classification with Feature-Guided Rectified Flow and Knowledge Distillation | arXiv | 2025 | Link |
| A Novel Framework for Significant Wave Height Prediction based on Adaptive Feature Extraction Time-Frequency Network | arXiv | 2025 | Link |
| A Novel Metric for Detecting Memorization in Generative Models for Brain MRI Synthesis | arXiv | 2025 | Link |
| A Numerical Gradient Inversion Attack in Variational Quantum Neural-Networks | arXiv | 2025 | Link |
| A Practical Framework for Evaluating Medical AI Security: Reproducible Assessment of Jailbreaking and Privacy Vulnerabilities Across Clinical Specialties | arXiv | 2025 | Link |
| A Privacy-Preserving Framework for Advertising Personalization Incorporating Federated Learning and Differential Privacy | arXiv | 2025 | Link |
| A Privacy-Preserving Recommender for Filling Web Forms Using a Local Large Language Model | arXiv | 2025 | Link |
| A Sample-Level Evaluation and Generative Framework for Model Inversion Attacks | arXiv | 2025 | Link |
| A Scenario-Oriented Survey of Federated Recommender Systems: Techniques, Challenges, and Future Directions | arXiv | 2025 | Link |
| A Selective Homomorphic Encryption Approach for Faster Privacy-Preserving Federated Learning | arXiv | 2025 | Link |
| A Study of Semi-Fungible Token based Wi-Fi Access Control | arXiv | 2025 | Link |
| A Study on Privacy-Preserving Scholarship Evaluation Based on Decentralized Identity and Zero-Knowledge Proofs | arXiv | 2025 | Link |
| A Survey of Attacks on Large Language Models | arXiv | 2025 | Link |
| A Survey of Generative Categories and Techniques in Multimodal Generative Models | arXiv | 2025 | Link |
| A Survey on Privacy Risks and Protection in Large Language Models | arXiv | 2025 | Link |
| A Survey on Responsible LLMs: Inherent Risk, Malicious Use, and Mitigation Strategy | arXiv | 2025 | Link |
| A Taxonomy of Attacks and Defenses in Split Learning | arXiv | 2025 | Link |
| A Transformer-Based Approach for Diagnosing Fault Cases in Optical Fiber Amplifiers | arXiv | 2025 | Link |
| A Weighted Gradient Tracking Privacy-Preserving Method for Distributed Optimization | arXiv | 2025 | Link |
| A geometric and deep learning reproducible pipeline for monitoring floating anthropogenic debris in urban rivers using in situ cameras | arXiv | 2025 | Link |
| A systematic review of trial-matching pipelines using large language models | arXiv | 2025 | Link |
| AADNet: Exploring EEG Spatiotemporal Information for Fast and Accurate Orientation and Timbre Detection of Auditory Attention Based on A Cue-Masked Paradigm | arXiv | 2025 | Link |
| AI Safety in the Eyes of the Downstream Developer: A First Look at Concerns, Practices, and Challenges | arXiv | 2025 | Link |
| AI-Driven Radio Propagation Prediction in Automated Warehouses using Variational Autoencoders | arXiv | 2025 | Link |
| AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models | arXiv | 2025 | Link |
| ALGEN: Few-shot Inversion Attacks on Textual Embeddings using Alignment and Generation | arXiv | 2025 | Link |
| ARMOUR US: Android Runtime Zero-permission Sensor Usage Monitoring from User Space | arXiv | 2025 | Link |
| ATLAS: A High-Difficulty, Multidisciplinary Benchmark for Frontier Scientific Reasoning | arXiv | 2025 | Link |
| AbBiBench: A Benchmark for Antibody Binding Affinity Maturation and Design | arXiv | 2025 | Link |
| Accelerating Differentially Private Federated Learning via Adaptive Extrapolation | arXiv | 2025 | Link |
| Achieving Effective Virtual Reality Interactions via Acoustic Gesture Recognition based on Large Language Models | arXiv | 2025 | Link |
| Adaptive Backtracking for Privacy Protection in Large Language Models | arXiv | 2025 | Link |
| Adaptive Sensing Performance Design for Enhancing Secure Communication in Networked ISAC Systems | arXiv | 2025 | Link |
| Adaptive Token Merging for Efficient Transformer Semantic Communication at the Edge | arXiv | 2025 | Link |
| Adaptive t Design Dummy-Gate Obfuscation for Cryogenic Scale Enforcement | arXiv | 2025 | Link |
| Advancing Practical Homomorphic Encryption for Federated Learning: Theoretical Guarantees and Efficiency Optimizations | arXiv | 2025 | Link |
| Advancing Security with Digital Twins: A Comprehensive Survey | arXiv | 2025 | Link |
| Adversarial Example Based Fingerprinting for Robust Copyright Protection in Split Learning | arXiv | 2025 | Link |
| Adversarial Reinforcement Learning for Large Language Model Agent Safety | arXiv | 2025 | Link |
| AegisLLM: Scaling Agentic Systems for Self-Reflective Defense in LLM Security | arXiv | 2025 | Link |
| Aerial Secure Collaborative Communications under Eavesdropper Collusion in Low-altitude Economy: A Generative Swarm Intelligent Approach | arXiv | 2025 | Link |
| AgentDAM: Privacy Leakage Evaluation for Autonomous Web Agents | arXiv | 2025 | Link |
| An Automated, Scalable Machine Learning Model Inversion Assessment Pipeline | arXiv | 2025 | Link |
| An Empirical Study on Commit Message Generation using LLMs via In-Context Learning | arXiv | 2025 | Link |
| An Empirical Study on the Security Vulnerabilities of GPTs | arXiv | 2025 | Link |
| An Improved Quantum Anonymous Notification Protocol for Quantum-Augmented Networks | arXiv | 2025 | Link |
| An Information Geometric Approach to Local Information Privacy with Applications to Max-lift and Local Differential Privacy | arXiv | 2025 | Link |
| An Invariant Latent Space Perspective on Language Model Inversion | arXiv | 2025 | Link |
| An Out-Of-Distribution Membership Inference Attack Approach for Cross-Domain Graph Attacks | arXiv | 2025 | Link |
| Analog Secure Distributed Matrix Multiplication | arXiv | 2025 | Link |
| Analysing Safety Risks in LLMs Fine-Tuned with Pseudo-Malicious Cyber Security Data | arXiv | 2025 | Link |
| Approaching the Harm of Gradient Attacks While Only Flipping Labels | arXiv | 2025 | Link |
| Approximate Domain Unlearning for Vision-Language Models | arXiv | 2025 | Link |
| Approximation theory for 1-Lipschitz ResNets | arXiv | 2025 | Link |
| Architectural Backdoors for Within-Batch Data Stealing and Model Inference Manipulation | arXiv | 2025 | Link |
| Are Neuro-Inspired Multi-Modal Vision-Language Models Resilient to Membership Inference Privacy Leakage? | arXiv | 2025 | Link |
| ArenaBencher: Automatic Benchmark Evolution via Multi-Model Competitive Evaluation | arXiv | 2025 | Link |
| Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships | arXiv | 2025 | Link |
| Artificial Intelligence-Driven Clinical Decision Support Systems | arXiv | 2025 | Link |
| Artificial intelligence as a surrogate brain: Bridging neural dynamical models and data | arXiv | 2025 | Link |
| Ascending the Infinite Ladder: Benchmarking Spatial Deformation Reasoning in Vision-Language Models | arXiv | 2025 | Link |
| Ask ChatGPT: Caveats and Mitigations for Individual Users of AI Chatbots | arXiv | 2025 | Link |
| Assessing Coherency and Consistency of Code Execution Reasoning by Large Language Models | arXiv | 2025 | Link |
| Assessing User Privacy Leakage in Synthetic Packet Traces: An Attack-Grounded Approach | arXiv | 2025 | Link |
| Assessing and Mitigating Data Memorization Risks in Fine-Tuned Large Language Models | arXiv | 2025 | Link |
| Attractive Metadata Attack: Inducing LLM Agents to Invoke Malicious Tools | arXiv | 2025 | Link |
| Auditing Data Provenance in Real-world Text-to-Image Diffusion Models for Privacy and Copyright Protection | arXiv | 2025 | Link |
| Auditing Prompt Caching in Language Model APIs | arXiv | 2025 | Link |
| AugMixCloak: A Defense against Membership Inference Attacks via Image Transformation | arXiv | 2025 | Link |
| Automated Privacy Information Annotation in Large Language Model Interactions | arXiv | 2025 | Link |
| Automated Profile Inference with Language Model Agents | arXiv | 2025 | Link |
| BYO-Eval: Build Your Own Dataset for Fine-Grained Visual Assessment of Multimodal Language Models | arXiv | 2025 | Link |
| Backing the Wrong Horse: How Bit-Level Netlist Augmentation can Counter Power Side Channel Attacks | arXiv | 2025 | Link |
| Balancing Privacy and Action Performance: A Penalty-Driven Approach to Image Anonymization | arXiv | 2025 | Link |
| Balancing Privacy and Utility in Correlated Data: A Study of Bayesian Differential Privacy | arXiv | 2025 | Link |
| Balancing Utility and Privacy: Dynamically Private SGD with Random Projection | arXiv | 2025 | Link |
| Bayesian Inference and Learning in Nonlinear Dynamical Systems: A Framework for Incorporating Explicit and Implicit Prior Knowledge | arXiv | 2025 | Link |
| BeamClean: Language Aware Embedding Reconstruction | arXiv | 2025 | Link |
| Beamforming Design for Secure RIS-Enabled ISAC: Passive RIS vs. Active RIS | arXiv | 2025 | Link |
| BenLOC: A Benchmark for Learning to Configure MIP Optimizers | arXiv | 2025 | Link |
| Better Language Model Inversion by Compactly Representing Next-Token Distributions | arXiv | 2025 | Link |
| Beyond Data Privacy: New Privacy Risks for Large Language Models | arXiv | 2025 | Link |
| Beyond Diagnostic Performance: Revealing and Quantifying Ethical Risks in Pathology Foundation Models | arXiv | 2025 | Link |
| Beyond Isolated Investor: Predicting Startup Success via Roleplay-Based Collective Agents | arXiv | 2025 | Link |
| Beyond Jailbreaking: Auditing Contextual Privacy in LLM Agents | arXiv | 2025 | Link |
| Beyond Leakage and Complexity: Towards Realistic and Efficient Information Cascade Prediction | arXiv | 2025 | Link |
| Beyond PII: How Users Attempt to Estimate and Mitigate Implicit LLM Inference | arXiv | 2025 | Link |
| Beyond Pixels: Semantic-aware Typographic Attack for Geo-Privacy Protection | arXiv | 2025 | Link |
| Beyond Simple Concatenation: Fairly Assessing PLM Architectures for Multi-Chain Protein-Protein Interactions Prediction | arXiv | 2025 | Link |
| Beyond Verification: Abductive Explanations for Post-AI Assessment of Privacy Leakage | arXiv | 2025 | Link |
| Beyond the Worst Case: Extending Differential Privacy Guarantees to Realistic Adversaries | arXiv | 2025 | Link |
| Bits for Privacy: Evaluating Post-Training Quantization via Membership Inference | arXiv | 2025 | Link |
| Black-Box Auditing of Quantum Model: Lifted Differential Privacy with Quantum Canaries | arXiv | 2025 | Link |
| Breaking BERT: Gradient Attack on Twitter Sentiment Analysis for Targeted Misclassification | arXiv | 2025 | Link |
| BudgetLeak: Membership Inference Attacks on RAG Systems via the Generation Budget Side Channel | arXiv | 2025 | Link |
| Building Age Estimation: A New Multi-Modal Benchmark Dataset and Community Challenge | arXiv | 2025 | Link |
| ByzSFL: Achieving Byzantine-Robust Secure Federated Learning with Zero-Knowledge Proofs | arXiv | 2025 | Link |
| Byzantine Outside, Curious Inside: Reconstructing Data Through Malicious Updates | arXiv | 2025 | Link |
| CAT: A GPU-Accelerated FHE Framework with Its Application to High-Precision Private Dataset Query | arXiv | 2025 | Link |
| CRFU: Compressive Representation Forgetting Against Privacy Leakage on Machine Unlearning | arXiv | 2025 | Link |
| CTIGuardian: A Few-Shot Framework for Mitigating Privacy Leakage in Fine-Tuned LLMs | arXiv | 2025 | Link |
| CV Quantum Communications with Angular Rejection Filtering: Modeling and Security Analysis | arXiv | 2025 | Link |
| Can Federated Learning Safeguard Private Data in LLM Training? Vulnerabilities, Attacks, and Defense Evaluation | arXiv | 2025 | Link |
| Can LLMs reason over extended multilingual contexts? Towards long-context evaluation beyond retrieval and haystacks | arXiv | 2025 | Link |
| Can Large Language Models Really Recognize Your Name? | arXiv | 2025 | Link |
| CapRecover: A Cross-Modality Feature Inversion Attack Framework on Vision Language Models | arXiv | 2025 | Link |
| Channel Selected Stratified Nested Cross Validation for Clinically Relevant EEG Based Parkinsons Disease Detection | arXiv | 2025 | Link |
| Characterizing Many-body Dynamics with Projected Ensembles on a Superconducting Quantum Processor | arXiv | 2025 | Link |
| Characterizing Trust Boundary Vulnerabilities in TEE Containers | arXiv | 2025 | Link |
| ChronoSteer: Bridging Large Language Model and Time Series Foundation Model via Synthetic Data | arXiv | 2025 | Link |
| Clinical-Grade Blood Pressure Prediction in ICU Settings: An Ensemble Framework with Uncertainty Quantification and Cross-Institutional Validation | arXiv | 2025 | Link |
| Cluster-guided LLM-Based Anonymization of Software Analytics Data: Studying Privacy-Utility Trade-offs in JIT Defect Prediction | arXiv | 2025 | Link |
| CoSPED: Consistent Soft Prompt Targeted Data Extraction and Defense | arXiv | 2025 | Link |
| CodeMorph: Mitigating Data Leakage in Large Language Model Assessment | arXiv | 2025 | Link |
| Collaborative LLM Numerical Reasoning with Local Data Protection | arXiv | 2025 | Link |
| Collaborative penetration testing suite for emerging generative AI algorithms | arXiv | 2025 | Link |
| ColorVein: Colorful Cancelable Vein Biometrics | arXiv | 2025 | Link |
| Comment on "mbtransfer: Microbiome intervention analysis using transfer functions and mirror statistics": Implementation errors, theoretical misapplication, and methodological flaws | arXiv | 2025 | Link |
| CompLeak: Deep Learning Model Compression Exacerbates Privacy Leakage | arXiv | 2025 | Link |
| Comparison of Lightweight Methods for Vehicle Dynamics-Based Driver Drowsiness Detection | arXiv | 2025 | Link |
| Computation-Efficient and Recognition-Friendly 3D Point Cloud Privacy Protection | arXiv | 2025 | Link |
| ConcreTizer: Model Inversion Attack via Occupancy Classification and Dispersion Control for 3D Point Cloud Restoration | arXiv | 2025 | Link |
| Confidentiality in a Card-Based Protocol Under Repeated Biased Shuffles | arXiv | 2025 | Link |
| ContextLeak: Auditing Leakage in Private In-Context Learning Methods | arXiv | 2025 | Link |
| Contextual Integrity in LLMs via Reasoning and Reinforcement Learning | arXiv | 2025 | Link |
| Controlled privacy leakage propagation throughout overlapping grouped learning | arXiv | 2025 | Link |
| Coverage-Guided Pre-Silicon Fuzzing of Open-Source Processors based on Leakage Contracts | arXiv | 2025 | Link |
| Cross-Modal Unlearning via Influential Neuron Path Editing in Multimodal Large Language Models | arXiv | 2025 | Link |
| Cryptanalysis via Machine Learning Based Information Theoretic Metrics | arXiv | 2025 | Link |
| Cueless EEG imagined speech for subject identification: dataset and benchmarks | arXiv | 2025 | Link |
| DBINDS -- Can Initial Noise from Diffusion Model Inversion Help Reveal AI-Generated Videos? | arXiv | 2025 | Link |
| DCMI: A Differential Calibration Membership Inference Attack Against Retrieval-Augmented Generation | arXiv | 2025 | Link |
| DELTA: Variational Disentangled Learning for Privacy-Preserving Data Reprogramming | arXiv | 2025 | Link |
| DIA: The Adversarial Exposure of Deterministic Inversion in Diffusion Models | arXiv | 2025 | Link |
| DOS: Distilling Observable Softmaps of Zipfian Prototypes for Self-Supervised Point Representation | arXiv | 2025 | Link |
| DP-AdamW: Investigating Decoupled Weight Decay and Bias Correction in Private Deep Learning | arXiv | 2025 | Link |
| DP-GPL: Differentially Private Graph Prompt Learning | arXiv | 2025 | Link |
| DPF-CM: A Data Processing Framework with Privacy-Preserving Vector Databases for Chinese Medical LLMs Training and Deployment | arXiv | 2025 | Link |
| DRAGOn: Designing RAG On Periodically Updated Corpus | arXiv | 2025 | Link |
| DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agents | arXiv | 2025 | Link |
| DRIK: Distribution-Robust Inductive Kriging without Information Leakage | arXiv | 2025 | Link |
| DRIVE: Data Curation Best Practices for Reinforcement Learning with Verifiable Reward in Competitive Code Generation | arXiv | 2025 | Link |
| DSBC : Data Science task Benchmarking with Context engineering | arXiv | 2025 | Link |
| DSFL: A Dual-Server Byzantine-Resilient Federated Learning Framework via Group-Based Secure Aggregation | arXiv | 2025 | Link |
| Data Leakage and Deceptive Performance: A Critical Examination of Credit Card Fraud Detection Methodologies | arXiv | 2025 | Link |
| Data Leakage and Redundancy in the LIT-PCBA Benchmark | arXiv | 2025 | Link |
| Data Leakage in Visual Datasets | arXiv | 2025 | Link |
| Data Privatization in Vertical Federated Learning with Client-wise Missing Problem | arXiv | 2025 | Link |
| Data-Free Black-Box Federated Learning via Zeroth-Order Gradient Estimation | arXiv | 2025 | Link |
| Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI | arXiv | 2025 | Link |
| Deciphering the Interplay between Attack and Protection Complexity in Privacy-Preserving Federated Learning | arXiv | 2025 | Link |
| Decompile-Bench: Million-Scale Binary-Source Function Pairs for Real-World Binary Decompilation | arXiv | 2025 | Link |
| Deep Learning Model Inversion Attacks and Defenses: A Comprehensive Survey | arXiv | 2025 | Link |
| Deep Multi-modal Breast Cancer Detection Network | arXiv | 2025 | Link |
| DeepResearch Arena: The First Exam of LLMs' Research Abilities via Seminar-Grounded Tasks | arXiv | 2025 | Link |
| Defeating Cerberus: Concept-Guided Privacy-Leakage Mitigation in Multimodal Language Models | arXiv | 2025 | Link |
| Defending Against Gradient Inversion Attacks for Biomedical Images via Learnable Data Perturbation | arXiv | 2025 | Link |
| Depth Gives a False Sense of Privacy: LLM Internal States Inversion | arXiv | 2025 | Link |
| Design and Analysis of a Concatenated Code for Intersymbol Interference Wiretap Channels | arXiv | 2025 | Link |
| Determining the origin of the X-ray emission in blazars through multiwavelength polarization | arXiv | 2025 | Link |
| DiViD: Disentangled Video Diffusion for Static-Dynamic Factorization | arXiv | 2025 | Link |
| DiagnosisArena: Benchmarking Diagnostic Reasoning for Large Language Models | arXiv | 2025 | Link |
| DictPFL: Efficient and Private Federated Learning on Encrypted Gradients | arXiv | 2025 | Link |
| DiffMI: Breaking Face Recognition Privacy via Diffusion-Driven Training-Free Model Inversion | arXiv | 2025 | Link |
| Differential Privacy Analysis of Decentralized Gossip Averaging under Varying Threat Models | arXiv | 2025 | Link |
| Differential Privacy Personalized Federated Learning Based on Dynamically Sparsified Client Updates | arXiv | 2025 | Link |
| Differential Privacy for Network Assortativity | arXiv | 2025 | Link |
| Differential Privacy in Federated Learning: Mitigating Inference Attacks with Randomized Response | arXiv | 2025 | Link |
| Differential Privacy: Gradient Leakage Attacks in Federated Learning Environments | arXiv | 2025 | Link |
| Differentially Private Computation of the Gini Index for Income Inequality | arXiv | 2025 | Link |
| Differentially Private Conformal Prediction via Quantile Binary Search | arXiv | 2025 | Link |
| Differentially Private Federated Clustering with Random Rebalancing | arXiv | 2025 | Link |
| Differentially Private Federated Low Rank Adaptation Beyond Fixed-Matrix | arXiv | 2025 | Link |
| Differentially Private Fisher Randomization Tests for Binary Outcomes | arXiv | 2025 | Link |
| Differentially Private Gradient-Tracking-Based Distributed Stochastic Optimization over Directed Graphs | arXiv | 2025 | Link |
| Differentially Private In-context Learning via Sampling Few-shot Mixed with Zero-shot Outputs | arXiv | 2025 | Link |
| Differentially Private Online Distributed Aggregative Games With Time-Varying and Non-Identical Communication and Feedback Delays | arXiv | 2025 | Link |
| Differentially Private Secure Multiplication with Erasures and Adversaries | arXiv | 2025 | Link |
| Differentially Private Two-Stage Gradient Descent for Instrumental Variable Regression | arXiv | 2025 | Link |
| Diffusion-aided Task-oriented Semantic Communications with Model Inversion Attack | arXiv | 2025 | Link |
| Diffusion-based Dynamic Contract for Federated AI Agent Construction in Mobile Metaverses | arXiv | 2025 | Link |
| Disparate Privacy Vulnerability: Targeted Attribute Inference Attacks and Defenses | arXiv | 2025 | Link |
| Distilling Expert Surgical Knowledge: How to train local surgical VLMs for anatomy explanation in Complete Mesocolic Excision | arXiv | 2025 | Link |
| Distributed Batch Matrix Multiplication: Trade-Offs in Download Rate, Randomness, and Privacy | arXiv | 2025 | Link |
| Distributed Fusion Estimation with Protecting Exogenous Inputs | arXiv | 2025 | Link |
| Distributed Platoon Control Under Quantization: Stability Analysis and Privacy Preservation | arXiv | 2025 | Link |
| Do Fairness Interventions Come at the Cost of Privacy: Evaluations for Binary Classifiers | arXiv | 2025 | Link |
| Do Reasoning Vision-Language Models Inversely Scale in Test-Time Compute? A Distractor-centric Empirical Analysis | arXiv | 2025 | Link |
| Do Spikes Protect Privacy? Investigating Black-Box Model Inversion Attacks in Spiking Neural Networks | arXiv | 2025 | Link |
| Do Vision-Language Models Leak What They Learn? Adaptive Token-Weighted Model Inversion Attacks | arXiv | 2025 | Link |
| Does Understanding Inform Generation in Unified Multimodal Models? From Analysis to Path Forward | arXiv | 2025 | Link |
| Domain-aware priors enable vertical federated learning in data-scarce coral multi-omics | arXiv | 2025 | Link |
| Doxing via the Lens: Revealing Location-related Privacy Leakage on Multi-modal Large Reasoning Models | arXiv | 2025 | Link |
| DreamVLA: A Vision-Language-Action Model Dreamed with Comprehensive World Knowledge | arXiv | 2025 | Link |
| Dropout-Robust Mechanisms for Differentially Private and Fully Decentralized Mean Estimation | arXiv | 2025 | Link |
| Dual-Phase Federated Deep Unlearning via Weight-Aware Rollback and Reconstruction | arXiv | 2025 | Link |
| Dual-View Inference Attack: Machine Unlearning Amplifies Privacy Exposure | arXiv | 2025 | Link |
| DualTAP: A Dual-Task Adversarial Protector for Mobile MLLM Agents | arXiv | 2025 | Link |
| DyLoC: A Dual-Layer Architecture for Secure and Trainable Quantum Machine Learning Under Polynomial-DLA constraint | arXiv | 2025 | Link |
| EASY: Emotion-aware Speaker Anonymization via Factorized Distillation | arXiv | 2025 | Link |
| EEG-to-fMRI synthesis of task-evoked and spontaneous brain activity: addressing issues of statistical significance and generalizability | arXiv | 2025 | Link |
| EdgePrompt: A Distributed Key-Value Inference Framework for LLMs in 6G Networks | arXiv | 2025 | Link |
| Effective and Efficient Cross-City Traffic Knowledge Transfer: A Privacy-Preserving Perspective | arXiv | 2025 | Link |
| Efficient Byzantine-Robust Privacy-Preserving Federated Learning via Dimension Compression | arXiv | 2025 | Link |
| Efficient Full-Stack Private Federated Deep Learning with Post-Quantum Security | arXiv | 2025 | Link |
| Efficient Multi-Worker Selection based Distributed Swarm Learning via Analog Aggregation | arXiv | 2025 | Link |
| Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds | arXiv | 2025 | Link |
| Electromagnetic Side-Channel Analysis of PRESENT Lightweight Cipher | arXiv | 2025 | Link |
| Emergent LLM behaviors are observationally equivalent to data leakage | arXiv | 2025 | Link |
| Empirical Comparison of Membership Inference Attacks in Deep Transfer Learning | arXiv | 2025 | Link |
| Enhanced Privacy Leakage from Noise-Perturbed Gradients via Gradient-Guided Conditional Diffusion Models | arXiv | 2025 | Link |
| Enhancing Federated Learning Privacy with QUBO | arXiv | 2025 | Link |
| EnronQA: Towards Personalized RAG over Private Documents | arXiv | 2025 | Link |
| Ensembling Membership Inference Attacks Against Tabular Generative Models | arXiv | 2025 | Link |
| Enter, Exit, Page Fault, Leak: Testing Isolation Boundaries for Microarchitectural Leaks | arXiv | 2025 | Link |
| Entropic learning enables skilful forecasts of ENSO phase at up to two years lead time | arXiv | 2025 | Link |
| Environment-Aware Indoor LoRaWAN Ranging Using Path Loss Model Inversion and Adaptive RSSI Filtering | arXiv | 2025 | Link |
| Evaluating Differential Privacy on Correlated Datasets Using Pointwise Maximal Leakage | arXiv | 2025 | Link |
| Evaluating Large Language Models on the 2026 Korean CSAT Mathematics Exam: Measuring Mathematical Ability in a Zero-Data-Leakage Setting | arXiv | 2025 | Link |
| Evaluating Privacy-Utility Tradeoffs in Synthetic Smart Grid Data | arXiv | 2025 | Link |
| Evaluating Selective Encryption Against Gradient Inversion Attacks | arXiv | 2025 | Link |
| Evaluating and Improving Large Language Models for Competitive Program Generation | arXiv | 2025 | Link |
| Evaluating the Dynamics of Membership Privacy in Deep Learning | arXiv | 2025 | Link |
| Evaluating the Process Modeling Abilities of Large Language Models -- Preliminary Foundations and Results | arXiv | 2025 | Link |
| Evaluating the Sensitivity of BiLSTM Forecasting Models to Sequence Length and Input Noise | arXiv | 2025 | Link |
| Event-based Video Person Re-identification via Cross-Modality and Temporal Collaboration | arXiv | 2025 | Link |
| Everyone's Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors | arXiv | 2025 | Link |
| Evolution without Large Models: Training Language Model with Task Principles | arXiv | 2025 | Link |
| Experimental Quantum Electronic Voting | arXiv | 2025 | Link |
| Explore the vulnerability of black-box models via diffusion models | arXiv | 2025 | Link |
| Exploring Graph Learning Tasks with Pure LLMs: A Comprehensive Benchmark and Investigation | arXiv | 2025 | Link |
| Exploring Potential Prompt Injection Attacks in Federated Military LLMs and Their Mitigation | arXiv | 2025 | Link |
| Exploring Selective Retrieval-Augmentation for Long-Tail Legal Text Classification | arXiv | 2025 | Link |
| Exploring the Potential and Limitations of Large Language Models for Novice Program Fault Localization | arXiv | 2025 | Link |
| Exploring the Vulnerabilities of Federated Learning: A Deep Dive into Gradient Inversion Attacks | arXiv | 2025 | Link |
| FADE: Frequency-Aware Diffusion Model Factorization for Video Editing | arXiv | 2025 | Link |
| FaceCloak: Learning to Protect Face Templates | arXiv | 2025 | Link |
| Factor Decorrelation Enhanced Data Removal from Deep Predictive Models | arXiv | 2025 | Link |
| Feasibility of short blocklength Reed-Muller codes for physical layer security in real environment | arXiv | 2025 | Link |
| FeatBench: Towards More Realistic Evaluation of Feature-level Code Generation | arXiv | 2025 | Link |
| Feature-Selective Representation Misdirection for Machine Unlearning | arXiv | 2025 | Link |
| FedAU2: Attribute Unlearning for User-Level Federated Recommender Systems with Adaptive and Robust Adversarial Training | arXiv | 2025 | Link |
| FedBKD: Distilled Federated Learning to Embrace Gerneralization and Personalization on Non-IID Data | arXiv | 2025 | Link |
| FedBM: Stealing Knowledge from Pre-trained Language Models for Heterogeneous Federated Learning | arXiv | 2025 | Link |
| FedGRec: Dynamic Spatio-Temporal Federated Graph Learning for Secure and Efficient Cross-Border Recommendations | arXiv | 2025 | Link |
| FedMPDD: Communication-Efficient Federated Learning with Privacy Preservation Attributes via Projected Directional Derivative | arXiv | 2025 | Link |
| FedMeNF: Privacy-Preserving Federated Meta-Learning for Neural Fields | arXiv | 2025 | Link |
| FedOnco-Bench: A Reproducible Benchmark for Privacy-Aware Federated Tumor Segmentation with Synthetic CT Data | arXiv | 2025 | Link |
| FedRE: A Representation Entanglement Framework for Model-Heterogeneous Federated Learning | arXiv | 2025 | Link |
| FedRE: Robust and Effective Federated Learning with Privacy Preference | arXiv | 2025 | Link |
| FedSDA: Federated Stain Distribution Alignment for Non-IID Histopathological Image Classification | arXiv | 2025 | Link |
| FedShield-LLM: A Secure and Scalable Federated Fine-Tuned Large Language Model | arXiv | 2025 | Link |
| Federated Anomaly Detection for Multi-Tenant Cloud Platforms with Personalized Modeling | arXiv | 2025 | Link |
| Federated Conversational Recommender System | arXiv | 2025 | Link |
| Federated Deep Reinforcement Learning for Privacy-Preserving Robotic-Assisted Surgery | arXiv | 2025 | Link |
| Federated Latent Factor Model for Bias-Aware Recommendation with Privacy-Preserving | arXiv | 2025 | Link |
| Federated Learning with Differential Privacy: An Utility-Enhanced Approach | arXiv | 2025 | Link |
| Feedback Lunch: Deep Feedback Codes for Wiretap Channels | arXiv | 2025 | Link |
| Few-Shot Fingerprinting Subject Re-Identification in 3D-MRI and 2D-X-Ray | arXiv | 2025 | Link |
| Find the Leak, Fix the Split: Cluster-Based Method to Prevent Leakage in Video-Derived Datasets | arXiv | 2025 | Link |
| Fine-Grained Privacy Extraction from Retrieval-Augmented Generation Systems via Knowledge Asymmetry Exploitation | arXiv | 2025 | Link |
| Fixed-Budget Parameter-Efficient Training with Frozen Encoders Improves Multimodal Chest X-Ray Classification | arXiv | 2025 | Link |
| FollowUpBot: An LLM-Based Conversational Robot for Automatic Postoperative Follow-up | arXiv | 2025 | Link |
| ForamDeepSlice: A High-Accuracy Deep Learning Framework for Foraminifera Species Classification from 2D Micro-CT Slices | arXiv | 2025 | Link |
| Formalisation of Security for Federated Learning with DP and Attacker Advantage in IIIf for Satellite Swarms -- Extended Version | arXiv | 2025 | Link |
| From Assistants to Adversaries: Exploring the Security Risks of Mobile LLM Agents | arXiv | 2025 | Link |
| From Easy to Hard: Building a Shortcut for Differentially Private Image Synthesis | arXiv | 2025 | Link |
| From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning | arXiv | 2025 | Link |
| From Membership-Privacy Leakage to Quantum Machine Unlearning | arXiv | 2025 | Link |
| From Prediction to Perfection: Introducing Refinement to Autoregressive Image Generation | arXiv | 2025 | Link |
| FuSeFL: Fully Secure and Scalable Federated Learning | arXiv | 2025 | Link |
| Functional Encryption in Secure Neural Network Training: Data Leakage and Practical Mitigations | arXiv | 2025 | Link |
| GAITEX: Human motion dataset of impaired gait and rehabilitation exercises using inertial and optical sensors | arXiv | 2025 | Link |
| GAMA: A General Anonymizing Multi-Agent System for Privacy Preservation Enhanced by Domain Rules and Disproof Mechanism | arXiv | 2025 | Link |
| GCC-Spam: Spam Detection via GAN, Contrastive Learning, and Character Similarity Networks | arXiv | 2025 | Link |
| GPT, But Backwards: Exactly Inverting Language Model Outputs | arXiv | 2025 | Link |
| GRAIN: Exact Graph Reconstruction from Gradients | arXiv | 2025 | Link |
| GRPO Privacy Is at Risk: A Membership Inference Attack Against Reinforcement Learning With Verifiable Rewards | arXiv | 2025 | Link |
| GUIDE: Enhancing Gradient Inversion Attacks in Federated Learning with Denoising Models | arXiv | 2025 | Link |
| Gaussian Shading++: Rethinking the Realistic Deployment Challenge of Performance-Lossless Image Watermark for Diffusion Models | arXiv | 2025 | Link |
| Generating Synthetic Data with Formal Privacy Guarantees: State of the Art and the Road Ahead | arXiv | 2025 | Link |
| Generative Induction of Dialogue Task Schemas with Streaming Refinement and Simulated Interactions | arXiv | 2025 | Link |
| Generative Model Inversion Through the Lens of the Manifold Hypothesis | arXiv | 2025 | Link |
| GeoArena: An Open Platform for Benchmarking Large Vision-language Models on WorldWide Image Geolocalization | arXiv | 2025 | Link |
| GhostEI-Bench: Do Mobile Agents Resilience to Environmental Injection in Dynamic On-Device Environments? | arXiv | 2025 | Link |
| Golden Partition Zone: Rethinking Neural Network Partitioning Under Inversion Threats in Collaborative Inference | arXiv | 2025 | Link |
| Gradient Inversion Attacks on Parameter-Efficient Fine-Tuning | arXiv | 2025 | Link |
| Gradient Inversion Transcript: Leveraging Robust Generative Priors to Reconstruct Training Data from Gradient Leakage | arXiv | 2025 | Link |
| Gradient Inversion in Federated Reinforcement Learning | arXiv | 2025 | Link |
| Graph Unlearning: Efficient Node Removal in Graph Neural Networks | arXiv | 2025 | Link |
| Graph-Level Label-Only Membership Inference Attack against Graph Neural Networks | arXiv | 2025 | Link |
| GraphQLer: Enhancing GraphQL Security with Context-Aware API Testing | arXiv | 2025 | Link |
| HALT-RAG: A Task-Adaptable Framework for Hallucination Detection with Calibrated NLI Ensembles and Abstention | arXiv | 2025 | Link |
| HalluLens: LLM Hallucination Benchmark | arXiv | 2025 | Link |
| HiDe-LLaVA: Hierarchical Decoupling for Continual Instruction Tuning of Multimodal Large Language Model | arXiv | 2025 | Link |
| Hidden Leaks in Time Series Forecasting: How Data Leakage Affects LSTM Evaluation Across Configurations and Validation Strategies | arXiv | 2025 | Link |
| Hierarchical Multi-Modal Threat Intelligence Fusion Without Aligned Data: A Practical Framework for Real-World Security Operations | arXiv | 2025 | Link |
| Honey Trap or Romantic Utopia: A Case Study of Final Fantasy XIV Players PII Disclosure in Intimate Partner-Seeking Posts | arXiv | 2025 | Link |
| How AI Forecasts AI Jobs: Benchmarking LLM Predictions of Labor Market Changes | arXiv | 2025 | Link |
| How Breakable Is Privacy: Probing and Resisting Model Inversion Attacks in Collaborative Inference | arXiv | 2025 | Link |
| How Far are App Secrets from Being Stolen? A Case Study on Android | arXiv | 2025 | Link |
| How Feasible is Augmenting Fake Nodes with Learnable Features as a Counter-strategy against Link Stealing Attacks? | arXiv | 2025 | Link |
| How Secure is Forgetting? Linking Machine Unlearning to Machine Learning Attacks | arXiv | 2025 | Link |
| How Would Oblivious Memory Boost Graph Analytics on Trusted Processors? | arXiv | 2025 | Link |
| How to DP-fy Your Data: A Practical Guide to Generating Synthetic Data With Differential Privacy | arXiv | 2025 | Link |
| Hybrid Physics-ML Framework for Pan-Arctic Permafrost Infrastructure Risk at Record 2.9-Million Observation Scale | arXiv | 2025 | Link |
| Hyperparameters in Score-Based Membership Inference Attacks | arXiv | 2025 | Link |
| I Can Tell Your Secrets: Inferring Privacy Attributes from Mini-app Interaction History in Super-apps | arXiv | 2025 | Link |
| I Know What You Bought Last Summer: Investigating User Data Leakage in E-Commerce Platforms | arXiv | 2025 | Link |
| IMU: Influence-guided Machine Unlearning | arXiv | 2025 | Link |
| IQBench: How "Smart'' Are Vision-Language Models? A Study with Human IQ Tests | arXiv | 2025 | Link |
| ISACL: Internal State Analyzer for Copyrighted Training Data Leakage | arXiv | 2025 | Link |
| Image Inversion: A Survey from GANs to Diffusion and Beyond | arXiv | 2025 | Link |
| Image Super-Resolution with Guarantees via Conformalized Generative Models | arXiv | 2025 | Link |
| Image selective encryption analysis using mutual information in CNN based embedding space | arXiv | 2025 | Link |
| Images in Motion?: A First Look into Video Leakage in Collaborative Deep Learning | arXiv | 2025 | Link |
| Impacts of Data Splitting Strategies on Parameterized Link Prediction Algorithms | arXiv | 2025 | Link |
| Imperfect preparation and Trojan attack on the phase modulator in the decoy-state BB84 protocol | arXiv | 2025 | Link |
| ImprovDML: Improved Trade-off in Private Byzantine-Resilient Distributed Machine Learning | arXiv | 2025 | Link |
| Improving ARDS Diagnosis Through Context-Aware Concept Bottleneck Models | arXiv | 2025 | Link |
| Improving Google A2A Protocol: Protecting Sensitive Data and Mitigating Unintended Harms in Multi-Agent Systems | arXiv | 2025 | Link |
| Improving LLM-Powered EDA Assistants with RAFT | arXiv | 2025 | Link |
| Improving Underwater Acoustic Classification Through Learnable Gabor Filter Convolution and Attention Mechanisms | arXiv | 2025 | Link |
| Improving key rates by tighter information reconciliation leakage estimation for quantum key distribution | arXiv | 2025 | Link |
| Individual Confidential Computing of Polynomials over Non-Uniform Information | arXiv | 2025 | Link |
| InfoDecom: Decomposing Information for Defending Against Privacy Leakage in Split Inference | arXiv | 2025 | Link |
| Information Leakage in Data Linkage | arXiv | 2025 | Link |
| Information Leakage of Sentence Embeddings via Generative Embedding Inversion Attacks | arXiv | 2025 | Link |
| Information Leakages in the Green Bond Market | arXiv | 2025 | Link |
| Information Theoretic One-Time Programs from Geometrically Local $\text{QNC}_0$ Adversaries | arXiv | 2025 | Link |
| Information-Theoretic Fairness with A Bounded Statistical Parity Constraint | arXiv | 2025 | Link |
| Integrated Security Mechanisms for Weight Protection in Memristive Crossbar Arrays | arXiv | 2025 | Link |
| Intelligent Joint Security and Delay Determinacy Performance Guarantee Strategy in RIS-Assisted IIoT Communication Systems | arXiv | 2025 | Link |
| IntentMiner: Intent Inversion Attack via Tool Call Analysis in the Model Context Protocol | arXiv | 2025 | Link |
| Interaction-Aware Parameter Privacy-Preserving Data Sharing in Coupled Systems via Particle Filter Reinforcement Learning | arXiv | 2025 | Link |
| Introducing Resilience to IRS-Assisted Secure Wireless Systems | arXiv | 2025 | Link |
| InverTune: Removing Backdoors from Multimodal Contrastive Learning Models via Trigger Inversion and Activation Tuning | arXiv | 2025 | Link |
| Inverse Reinforcement Learning using Revealed Preferences and Passive Stochastic Optimization | arXiv | 2025 | Link |
| Inversion-DPO: Precise and Efficient Post-Training for Diffusion Models | arXiv | 2025 | Link |
| Inverting Black-Box Face Recognition Systems via Zero-Order Optimization in Eigenface Space | arXiv | 2025 | Link |
| Investigating Timing-Based Information Leakage in Data Flow-Driven Real-Time Systems | arXiv | 2025 | Link |
| Invisible Prompts, Visible Threats: Malicious Font Injection in External Resources for Large Language Models | arXiv | 2025 | Link |
| IoTFuzzSentry: A Protocol Guided Mutation Based Fuzzer for Automatic Vulnerability Testing in Commercial IoT Devices | arXiv | 2025 | Link |
| Is Your LLM Really Mastering the Concept? A Multi-Agent Benchmark | arXiv | 2025 | Link |
| Islands in Kerr-Newman Black Holes | arXiv | 2025 | Link |
| KHRONOS: a Kernel-Based Neural Architecture for Rapid, Resource-Efficient Scientific Computation | arXiv | 2025 | Link |
| KV-Auditor: Auditing Local Differential Privacy for Correlated Key-Value Estimation | arXiv | 2025 | Link |
| Keystroke Detection by Exploiting Unintended RF Emission from Repaired USB Keyboards | arXiv | 2025 | Link |
| Knowledge Distillation for Variational Quantum Convolutional Neural Networks on Heterogeneous Data | arXiv | 2025 | Link |
| Knowledge-Guided Machine Learning Models to Upscale Evapotranspiration in the U.S. Midwest | arXiv | 2025 | Link |
| LADSG: Label-Anonymized Distillation and Similar Gradient Substitution for Label Privacy in Vertical Federated Learning | arXiv | 2025 | Link |
| LAGO: Few-shot Crosslingual Embedding Inversion Attacks via Language Similarity-Aware Graph Optimization | arXiv | 2025 | Link |
| LANPO: Bootstrapping Language and Numerical Feedback for Reinforcement Learning in LLMs | arXiv | 2025 | Link |
| LAPA-based Dynamic Privacy Optimization for Wireless Federated Learning in Heterogeneous Environments | arXiv | 2025 | Link |
| LITcoder: A General-Purpose Library for Building and Comparing Encoding Models | arXiv | 2025 | Link |
| LLA: Enhancing Security and Privacy for Generative Models with Logic-Locked Accelerators | arXiv | 2025 | Link |
| LLM Agents Should Employ Security Principles | arXiv | 2025 | Link |
| LLMs on support of privacy and security of mobile apps: state of the art and research directions | arXiv | 2025 | Link |
| LOCO-EPI: Leave-one-chromosome-out (LOCO) as a benchmarking paradigm for deep learning based prediction of enhancer-promoter interactions | arXiv | 2025 | Link |
| LSHFed: Robust and Communication-Efficient Federated Learning with Locally-Sensitive Hashing Gradient Mapping | arXiv | 2025 | Link |
| Large Language Models for Validating Network Protocol Parsers | arXiv | 2025 | Link |
| Large-Scale FPGA-Based Privacy Amplification Exceeding $10^8$ Bits for Quantum Key Distribution | arXiv | 2025 | Link |
| LastingBench: Defend Benchmarks Against Knowledge Leakage | arXiv | 2025 | Link |
| Latent Diffusion Inversion Requires Understanding the Latent Space | arXiv | 2025 | Link |
| Latent Diffusion Unlearning: Protecting Against Unauthorized Personalization Through Trajectory Shifted Perturbations | arXiv | 2025 | Link |
| Latent Twins | arXiv | 2025 | Link |
| LeakSealer: A Semisupervised Defense for LLMs Against Prompt Injection and Leakage Attacks | arXiv | 2025 | Link |
| Leakage and Interpretability in Concept-Based Models | arXiv | 2025 | Link |
| Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset | arXiv | 2025 | Link |
| LeakageDetector 2.0: Analyzing Data Leakage in Jupyter-Driven Machine Learning Pipelines | arXiv | 2025 | Link |
| LeakageDetector: An Open Source Data Leakage Analysis Tool in Machine Learning Pipelines | arXiv | 2025 | Link |
| Leaky Thoughts: Large Reasoning Models Are Not Private Thinkers | arXiv | 2025 | Link |
| LeakyCLIP: Extracting Training Data from CLIP | arXiv | 2025 | Link |
| Learning Private Representations through Entropy-based Adversarial Training | arXiv | 2025 | Link |
| Learning to Diagnose Privately: DP-Powered LLMs for Radiology Report Classification | arXiv | 2025 | Link |
| Learning to Erase Private Knowledge from Multi-Documents for Retrieval-Augmented Large Language Models | arXiv | 2025 | Link |
| Learning to Extract Rational Evidence via Reinforcement Learning for Retrieval-Augmented Generation | arXiv | 2025 | Link |
| LessLeak-Bench: A First Investigation of Data Leakage in LLMs Across 83 Software Engineering Benchmarks | arXiv | 2025 | Link |
| LexGenius: An Expert-Level Benchmark for Large Language Models in Legal General Intelligence | arXiv | 2025 | Link |
| Lightweight Deep Autoencoder for ECG Denoising with Morphology Preservation and Near Real-Time Hardware Deployment | arXiv | 2025 | Link |
| Lita: Light Agent Uncovers the Agentic Coding Capabilities of LLMs | arXiv | 2025 | Link |
| LiveTradeBench: Seeking Real-World Alpha with Large Language Models | arXiv | 2025 | Link |
| LoRA-Leak: Membership Inference Attacks Against LoRA Fine-tuned Language Models | arXiv | 2025 | Link |
| Local Information-Theoretic Security via Euclidean Geometry | arXiv | 2025 | Link |
| Logit-Gap Steering: Efficient Short-Suffix Jailbreaks for Aligned Large Language Models | arXiv | 2025 | Link |
| Lost in Modality: Evaluating the Effectiveness of Text-Based Membership Inference Attacks on Large Multimodal Models | arXiv | 2025 | Link |
| Low Complexity Artificial Noise Aided Beam Focusing Design in Near-Field Terahertz Communications | arXiv | 2025 | Link |
| Low-complexity Leakage Minimization Beamforming for Large-scale Multi-user Cell-Free Massive MIMO | arXiv | 2025 | Link |
| LuxVeri at GenAI Detection Task 1: Inverse Perplexity Weighted Ensemble for Robust Detection of AI-Generated Text across English and Multilingual Contexts | arXiv | 2025 | Link |
| MAGIA: Sensing Per-Image Signals from Single-Round Averaged Gradients for Label-Inference-Free Gradient Inversion | arXiv | 2025 | Link |
| MAGPIE: A benchmark for Multi-AGent contextual PrIvacy Evaluation | arXiv | 2025 | Link |
| MASS: Muli-agent simulation scaling for portfolio construction | arXiv | 2025 | Link |
| MCTED: A Machine-Learning-Ready Dataset for Digital Elevation Model Generation From Mars Imagery | arXiv | 2025 | Link |
| MER-Inspector: Assessing model extraction risks from an attack-agnostic perspective | arXiv | 2025 | Link |
| METHOD: Modular Efficient Transformer for Health Outcome Discovery | arXiv | 2025 | Link |
| MIMIC: Multimodal Inversion for Model Interpretation and Conceptualization | arXiv | 2025 | Link |
| MLIP Arena: Advancing Fairness and Transparency in Machine Learning Interatomic Potentials via an Open, Accessible Benchmark Platform | arXiv | 2025 | Link |
| MLLM-Based UI2Code Automation Guided by UI Layout Information | arXiv | 2025 | Link |
| MTGR: Industrial-Scale Generative Recommendation Framework in Meituan | arXiv | 2025 | Link |
| MURIM: Multidimensional Reputation-based Incentive Mechanism for Federated Learning | arXiv | 2025 | Link |
| MagicDock: Toward Docking-oriented De Novo Ligand Design via Gradient Inversion | arXiv | 2025 | Link |
| Mean-Variance Stackelberg Games with Asymmetric Information | arXiv | 2025 | Link |
| Measuring Leakage in Concept-Based Methods: An Information Theoretic Approach | arXiv | 2025 | Link |
| Mechanism Design with Information Leakage | arXiv | 2025 | Link |
| MedForge: Building Medical Foundation Models Like Open Source Software Development | arXiv | 2025 | Link |
| MedFoundationHub: A Lightweight and Secure Toolkit for Deploying Medical Vision Language Foundation Models | arXiv | 2025 | Link |
| MedXpertQA: Benchmarking Expert-Level Medical Reasoning and Understanding | arXiv | 2025 | Link |
| Membership Inference Attacks fueled by Few-Short Learning to detect privacy leakage tackling data integrity | arXiv | 2025 | Link |
| Membership Inference Attacks on Sequence Models | arXiv | 2025 | Link |
| Memories Retrieved from Many Paths: A Multi-Prefix Framework for Robust Detection of Training Data Leakage in Large Language Models | arXiv | 2025 | Link |
| Memorization in 3D Shape Generation: An Empirical Study | arXiv | 2025 | Link |
| Memorization in Language Models through the Lens of Intrinsic Dimension | arXiv | 2025 | Link |
| Memory-Augmented Generative AI for Real-time Wireless Prediction in Dynamic Industrial Environments | arXiv | 2025 | Link |
| Meta-Guardian: An Early Evaluation of an On-device Application to Mitigate Psychography Data Leakage in Immersive Technologies | arXiv | 2025 | Link |
| Mimicking the Familiar: Dynamic Command Generation for Information Theft Attacks in LLM Tool-Learning System | arXiv | 2025 | Link |
| Mini Diffuser: Fast Multi-task Diffusion Policy Training Using Two-level Mini-batches | arXiv | 2025 | Link |
| Mitigating Cross-Image Information Leakage in LVLMs for Multi-Image Tasks | arXiv | 2025 | Link |
| Mitigating Data Exfiltration Attacks through Layer-Wise Learning Rate Decay Fine-Tuning | arXiv | 2025 | Link |
| Mitigating Privacy-Utility Trade-off in Decentralized Federated Learning via $f$-Differential Privacy | arXiv | 2025 | Link |
| Mitigating Sensitive Information Leakage in LLMs4Code through Machine Unlearning | arXiv | 2025 | Link |
| MoGA: 3D Generative Avatar Prior for Monocular Gaussian Avatar Reconstruction | arXiv | 2025 | Link |
| Model Inversion Attack Against Deep Hashing | arXiv | 2025 | Link |
| Model Inversion Attack against Federated Unlearning | arXiv | 2025 | Link |
| Model Inversion Attacks Meet Cryptographic Fuzzy Extractors | arXiv | 2025 | Link |
| Model Inversion Attacks on Llama 3: Extracting PII from Large Language Models | arXiv | 2025 | Link |
| Model Inversion in Split Learning for Personalized LLMs: New Insights from Information Bottleneck Theory | arXiv | 2025 | Link |
| Model Inversion with Layer-Specific Modeling and Alignment for Data-Free Continual Learning | arXiv | 2025 | Link |
| Motus: A Unified Latent Action World Model | arXiv | 2025 | Link |
| Multi-Agent Distributed Optimization With Feasible Set Privacy | arXiv | 2025 | Link |
| Multi-Disease Deep Learning Framework for GWAS: Beyond Feature Selection Constraints | arXiv | 2025 | Link |
| Multi-Hop Privacy Propagation for Differentially Private Federated Learning in Social Networks | arXiv | 2025 | Link |
| Multi-Stage Prompt Inference Attacks on Enterprise LLM Systems | arXiv | 2025 | Link |
| Multi-View Graph Feature Propagation for Privacy Preservation and Feature Sparsity | arXiv | 2025 | Link |
| Multi-photon QKD for Practical Quantum Networks | arXiv | 2025 | Link |
| Multimodal Deep Learning for Phyllodes Tumor Classification from Ultrasound and Clinical Data | arXiv | 2025 | Link |
| Multiparty Authorization for Secure Data Storage in Cloud Environments using Improved Attribute-Based Encryption | arXiv | 2025 | Link |
| Mutual Information Bounds in the Shuffle Model | arXiv | 2025 | Link |
| Mutual Information Minimization for Side-Channel Attack Resistance via Optimal Noise Injection | arXiv | 2025 | Link |
| NET-SA: An Efficient Secure Aggregation Architecture Based on In-Network Computing | arXiv | 2025 | Link |
| Nash Equilibrium Between Consumer Electronic Devices and DoS Attacker for Distributed IoT-enabled RSE Systems | arXiv | 2025 | Link |
| Near-field Liquid Crystal RIS Phase-Shift Design for Secure Wideband Illumination | arXiv | 2025 | Link |
| Network Oblivious Transfer via Noisy Broadcast Channels | arXiv | 2025 | Link |
| Network Structures as an Attack Surface: Topology-Based Privacy Leakage in Federated Learning | arXiv | 2025 | Link |
| Neural Breadcrumbs: Membership Inference Attacks on LLMs Through Hidden State and Attention Pattern Analysis | arXiv | 2025 | Link |
| Neural Estimation of Information Leakage for Secure Communication System Design | arXiv | 2025 | Link |
| NoHumansRequired: Autonomous High-Quality Image Editing Triplet Mining | arXiv | 2025 | Link |
| NoLBERT: A No Lookahead(back) Foundational Language Model | arXiv | 2025 | Link |
| Non-Linear Trajectory Modeling for Multi-Step Gradient Inversion Attacks in Federated Learning | arXiv | 2025 | Link |
| Nosy Layers, Noisy Fixes: Tackling DRAs in Federated Learning Systems using Explainable AI | arXiv | 2025 | Link |
| OBELiX: A Curated Dataset of Crystal Structures and Experimentally Measured Ionic Conductivities for Lithium Solid-State Electrolytes | arXiv | 2025 | Link |
| OPC: One-Point-Contraction Unlearning Toward Deep Feature Forgetting | arXiv | 2025 | Link |
| ORQ: Complex Analytics on Private Data with Strong Security Guarantees | arXiv | 2025 | Link |
| OS-Sentinel: Towards Safety-Enhanced Mobile GUI Agents via Hybrid Validation in Realistic Workflows | arXiv | 2025 | Link |
| OTS-PC: OTS-based Payment Channels for the Lightning Network | arXiv | 2025 | Link |
| Omni-Attribute: Open-vocabulary Attribute Encoder for Visual Concept Personalization | arXiv | 2025 | Link |
| OmniFC: Rethinking Federated Clustering via Lossless and Secure Distance Reconstruction | arXiv | 2025 | Link |
| On Secrecy Capacity of Binary Beampointing Channels with Block Memory and Feedback | arXiv | 2025 | Link |
| On the Account Security Risks Posed by Password Strength Meters | arXiv | 2025 | Link |
| On the Average Secrecy Performance of Satellite Networks in Short Packet Communication Systems | arXiv | 2025 | Link |
| On the Detectability of Active Gradient Inversion Attacks in Federated Learning | arXiv | 2025 | Link |
| On the Interplay of Privacy, Persuasion and Quantization | arXiv | 2025 | Link |
| On the MIA Vulnerability Gap Between Private GANs and Diffusion Models | arXiv | 2025 | Link |
| On the Necessity of Output Distribution Reweighting for Effective Class Unlearning | arXiv | 2025 | Link |
| On the Privacy-Preserving Properties of Spiking Neural Networks with Unique Surrogate Gradients and Quantization Levels | arXiv | 2025 | Link |
| On the de-duplication of the Lakh MIDI dataset | arXiv | 2025 | Link |
| One-Bit Model Aggregation for Differentially Private and Byzantine-Robust Personalized Federated Learning | arXiv | 2025 | Link |
| Opacity problems in multi-energy timed automata | arXiv | 2025 | Link |
| OpenGuardrails: A Configurable, Unified, and Scalable Guardrails Platform for Large Language Models | arXiv | 2025 | Link |
| Optimal Differentially Private Randomized Response Designs to Collect Sensitive Binary Data | arXiv | 2025 | Link |
| Optimal Privacy-Preserving Distributed Median Consensus | arXiv | 2025 | Link |
| Optimizing Indoor RIS-Aided Physical-Layer Security: A Codebook-Generation Methodology and Measurement-Based Analysis | arXiv | 2025 | Link |
| Optimizing Leaky Private Information Retrieval Codes to Achieve ${O}(\log K)$ Leakage Ratio Exponent | arXiv | 2025 | Link |
| Outsourcing SAT-based Verification Computations in Network Security | arXiv | 2025 | Link |
| P3SL: Personalized Privacy-Preserving Split Learning on Heterogeneous Edge Devices | arXiv | 2025 | Link |
| PAUSE: Low-Latency and Privacy-Aware Active User Selection for Federated Learning | arXiv | 2025 | Link |
| PDSL: Privacy-Preserved Decentralized Stochastic Learning with Heterogeneous Data Distribution | arXiv | 2025 | Link |
| PEEL the Layers and Find Yourself: Revisiting Inference-time Data Leakage for Residual Neural Networks | arXiv | 2025 | Link |
| PIG: Privacy Jailbreak Attack on LLMs via Gradient-based Iterative In-Context Optimization | arXiv | 2025 | Link |
| PII Jailbreaking in LLMs via Activation Steering Reveals Personal Information Leakage | arXiv | 2025 | Link |
| POLARIS: Cross-Domain Access Control via Verifiable Identity and Policy-Based Authorization | arXiv | 2025 | Link |
| PPFL-RDSN: Privacy-Preserving Federated Learning-based Residual Dense Spatial Networks for Encrypted Lossy Image Reconstruction | arXiv | 2025 | Link |
| PPO-MI: Efficient Black-Box Model Inversion via Proximal Policy Optimization | arXiv | 2025 | Link |
| PQBFL: A Post-Quantum Blockchain-based Protocol for Federated Learning | arXiv | 2025 | Link |
| PRIVET: Privacy Metric Based on Extreme Value Theory | arXiv | 2025 | Link |
| Partial Secrecy Analysis in Wireless Systems: Diversity-Enhanced PLS over Generalized Fading Channels | arXiv | 2025 | Link |
| Patch Rebirth: Toward Fast and Transferable Model Inversion of Vision Transformers | arXiv | 2025 | Link |
| PathBench: A comprehensive comparison benchmark for pathology foundation models towards precision oncology | arXiv | 2025 | Link |
| Peekaboo, I See Your Queries: Passive Attacks Against DSSE Via Intermittent Observations | arXiv | 2025 | Link |
| PerProb: Indirectly Evaluating Memorization in Large Language Models | arXiv | 2025 | Link |
| Perfectly-Private Analog Secure Aggregation in Federated Learning | arXiv | 2025 | Link |
| Personalized 3D Spatiotemporal Trajectory Privacy Protection with Differential and Distortion Geo-Perturbation | arXiv | 2025 | Link |
| Personalized Risks and Regulatory Strategies of Large Language Models in Digital Advertising | arXiv | 2025 | Link |
| PhantomWiki: On-Demand Datasets for Reasoning and Retrieval Evaluation | arXiv | 2025 | Link |
| PhyAVBench: A Challenging Audio Physics-Sensitivity Benchmark for Physically Grounded Text-to-Audio-Video Generation | arXiv | 2025 | Link |
| Physics informed Transformer-VAE for biophysical parameter estimation: PROSAIL model inversion in Sentinel-2 imagery | arXiv | 2025 | Link |
| Physics-Inspired Distributed Radio Map Estimation | arXiv | 2025 | Link |
| Pitfalls of Evaluating Language Models with Open Benchmarks | arXiv | 2025 | Link |
| Plane Geometry Problem Solving with Multi-modal Reasoning: A Survey | arXiv | 2025 | Link |
| PoSyn: Secure Power Side-Channel Aware Synthesis | arXiv | 2025 | Link |
| Point-level Uncertainty Evaluation of Mobile Laser Scanning Point Clouds | arXiv | 2025 | Link |
| Poison to Detect: Detection of Targeted Overfitting in Federated Learning | arXiv | 2025 | Link |
| Policy Gradient Methods for Information-Theoretic Opacity in Markov Decision Processes | arXiv | 2025 | Link |
| Power-Efficient Deceptive Wireless Beamforming Against Eavesdroppers | arXiv | 2025 | Link |
| Power-consumption Backdoor in Quantum Key Distribution | arXiv | 2025 | Link |
| Practical Feasibility of Gradient Inversion Attacks in Federated Learning | arXiv | 2025 | Link |
| Practical Secure Inference Algorithm for Fine-tuned Large Language Model Based on Fully Homomorphic Encryption | arXiv | 2025 | Link |
| Predicting Movie Success with Multi-Task Learning: A Hybrid Framework Combining GPT-Based Sentiment Analysis and SIR Propagation | arXiv | 2025 | Link |
| Preserving Cross-Modal Stability for Visual Unlearning in Multimodal Scenarios | arXiv | 2025 | Link |
| PrivCode: When Code Generation Meets Differential Privacy | arXiv | 2025 | Link |
| PrivORL: Differentially Private Synthetic Dataset for Offline Reinforcement Learning | arXiv | 2025 | Link |
| PrivTru: A Privacy-by-Design Data Trustee Minimizing Information Leakage | arXiv | 2025 | Link |
| PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration | arXiv | 2025 | Link |
| Privacy Attacks on Image AutoRegressive Models | arXiv | 2025 | Link |
| Privacy Auditing Synthetic Data Release through Local Likelihood Attacks | arXiv | 2025 | Link |
| Privacy Auditing of Large Language Models | arXiv | 2025 | Link |
| Privacy Beyond Pixels: Latent Anonymization for Privacy-Preserving Video Understanding | arXiv | 2025 | Link |
| Privacy Guarantee for Nash Equilibrium Computation of Aggregative Games Based on Pointwise Maximal Leakage | arXiv | 2025 | Link |
| Privacy Leaks by Adversaries: Adversarial Iterations for Membership Inference Attack | arXiv | 2025 | Link |
| Privacy Preservation in Gen AI Applications | arXiv | 2025 | Link |
| Privacy Preserving Charge Location Prediction for Electric Vehicles | arXiv | 2025 | Link |
| Privacy Preserving In-Context-Learning Framework for Large Language Models | arXiv | 2025 | Link |
| Privacy Preserving Properties of Vision Classifiers | arXiv | 2025 | Link |
| Privacy Risks of LLM-Empowered Recommender Systems: An Inversion Attack Perspective | arXiv | 2025 | Link |
| Privacy in Action: Towards Realistic Privacy Mitigation and Evaluation for LLM-Powered Agents | arXiv | 2025 | Link |
| Privacy in Federated Learning with Spiking Neural Networks | arXiv | 2025 | Link |
| Privacy-Aware Decoding: Mitigating Privacy Leakage of Large Language Models in Retrieval-Augmented Generation | arXiv | 2025 | Link |
| Privacy-Aware RAG: Secure and Isolated Knowledge Retrieval | arXiv | 2025 | Link |
| Privacy-Aware Sharing of Raw Spatial Sensor Data for Cooperative Perception | arXiv | 2025 | Link |
| Privacy-Preserving AI for Encrypted Medical Imaging: A Framework for Secure Diagnosis and Learning | arXiv | 2025 | Link |
| Privacy-Preserving Dataset Combination | arXiv | 2025 | Link |
| Privacy-Preserving Decentralized Federated Learning via Explainable Adaptive Differential Privacy | arXiv | 2025 | Link |
| Privacy-Preserving Explainable AIoT Application via SHAP Entropy Regularization | arXiv | 2025 | Link |
| Privacy-Preserving Federated Embedding Learning for Localized Retrieval-Augmented Generation | arXiv | 2025 | Link |
| Privacy-Preserving Federated Learning Framework for Risk-Based Adaptive Authentication | arXiv | 2025 | Link |
| Privacy-Preserving Federated Vision Transformer Learning Leveraging Lightweight Homomorphic Encryption in Medical AI | arXiv | 2025 | Link |
| Privacy-Preserving Fully Distributed Gaussian Process Regression | arXiv | 2025 | Link |
| Privacy-Preserving Peer-to-Peer Energy Trading via Hybrid Secure Computations | arXiv | 2025 | Link |
| Privacy-Preserving Reasoning with Knowledge-Distilled Parametric Retrieval Augmented Generation | arXiv | 2025 | Link |
| Privacy-Preserving State Estimation with Crowd Sensors: An Information-Theoretic Respective | arXiv | 2025 | Link |
| Privacy-Utility-Fairness: A Balanced Approach to Vehicular-Traffic Management System | arXiv | 2025 | Link |
| Privacy-aware Berrut Approximated Coded Computing applied to general distributed learning | arXiv | 2025 | Link |
| PrivacyPAD: A Reinforcement Learning Framework for Dynamic Privacy-Aware Delegation | arXiv | 2025 | Link |
| Private From Whom? Minimal Information Leakage in Auctions | arXiv | 2025 | Link |
| Private Memorization Editing: Turning Memorization into a Defense to Strengthen Data Privacy in Large Language Models | arXiv | 2025 | Link |
| Private Remote Phase Estimation over a Lossy Quantum Channel | arXiv | 2025 | Link |
| Private Sketches for Linear Regression | arXiv | 2025 | Link |
| Private and Fair Machine Learning: Revisiting the Disparate Impact of Differentially Private SGD | arXiv | 2025 | Link |
| Probability Distribution Alignment and Low-Rank Weight Decomposition for Source-Free Domain Adaptive Brain Decoding | arXiv | 2025 | Link |
| Profit Mirage: Revisiting Information Leakage in LLM-based Financial Agents | arXiv | 2025 | Link |
| Progent: Programmable Privilege Control for LLM Agents | arXiv | 2025 | Link |
| Prompt Inversion Attack against Collaborative Inference of Large Language Models | arXiv | 2025 | Link |
| Prostate-VarBench: A Benchmark with Interpretable TabNet Framework for Prostate Cancer Variant Classification | arXiv | 2025 | Link |
| Protecting Bystander Privacy via Selective Hearing in Audio LLMs | arXiv | 2025 | Link |
| Provably Near-Optimal Federated Ensemble Distillation with Negligible Overhead | arXiv | 2025 | Link |
| Provably Secure Retrieval-Augmented Generation | arXiv | 2025 | Link |
| Public Data Assisted Differentially Private In-Context Learning | arXiv | 2025 | Link |
| Quantifying Privacy Leakage in Split Inference via Fisher-Approximated Shannon Information Analysis | arXiv | 2025 | Link |
| Quantifying Source Speaker Leakage in One-to-One Voice Conversion | arXiv | 2025 | Link |
| Quantifying the Privacy Implications of High-Fidelity Synthetic Network Traffic | arXiv | 2025 | Link |
| Quantized-Tinyllava: a new multimodal foundation model enables efficient split learning | arXiv | 2025 | Link |
| Quantum Computing Supported Adversarial Attack-Resilient Autonomous Vehicle Perception Module for Traffic Sign Classification | arXiv | 2025 | Link |
| Quantum-Inspired Privacy-Preserving Federated Learning Framework for Secure Dementia Classification | arXiv | 2025 | Link |
| REMIND: Input Loss Landscapes Reveal Residual Memorization in Post-Unlearning LLMs | arXiv | 2025 | Link |
| RESFL: An Uncertainty-Aware Framework for Responsible Federated Learning by Balancing Privacy, Fairness and Utility in Autonomous Vehicles | arXiv | 2025 | Link |
| REVAL: A Comprehension Evaluation on Reliability and Values of Large Vision-Language Models | arXiv | 2025 | Link |
| RIDE: Difficulty Evolving Perturbation with Item Response Theory for Mathematical Reasoning | arXiv | 2025 | Link |
| RPKI-Based Location-Unaware Tor Guard Relay Selection Algorithms | arXiv | 2025 | Link |
| RTBAS: Defending LLM Agents Against Prompt Injection and Privacy Leakage | arXiv | 2025 | Link |
| Random Client Selection on Contrastive Federated Learning for Tabular Data | arXiv | 2025 | Link |
| Randomness quantification in spontaneous emission | arXiv | 2025 | Link |
| ReCIT: Reconstructing Full Private Data from Gradient in Parameter-Efficient Fine-Tuning of Large Language Models | arXiv | 2025 | Link |
| Real-Time Privacy Risk Measurement with Privacy Tokens for Gradient Leakage | arXiv | 2025 | Link |
| Real-time ML-based Defense Against Malicious Payload in Reconfigurable Embedded Systems | arXiv | 2025 | Link |
| Reasoning Model Unlearning: Forgetting Traces, Not Just Answers, While Preserving Reasoning Skills | arXiv | 2025 | Link |
| RecRankerEval: A Flexible and Extensible Framework for Top-k LLM-based Recommendation | arXiv | 2025 | Link |
| Recursive Privacy-Preserving Estimation Over Markov Fading Channels | arXiv | 2025 | Link |
| Repair Ingredients Are All You Need: Improving Large Language Model-Based Program Repair via Repair Ingredients Search | arXiv | 2025 | Link |
| Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs | arXiv | 2025 | Link |
| Reply to "Emergent LLM behaviors are observationally equivalent to data leakage" | arXiv | 2025 | Link |
| Reproducibility Study of Cooperation, Competition, and Maliciousness: LLM-Stakeholders Interactive Negotiation | arXiv | 2025 | Link |
| Reproducibility and Artifact Consistency of the SIGIR 2022 Recommender Systems Papers Based on Message Passing | arXiv | 2025 | Link |
| Research on Large Language Model Cross-Cloud Privacy Protection and Collaborative Training based on Federated Learning | arXiv | 2025 | Link |
| Research on the Design of a Short Video Recommendation System Based on Multimodal Information and Differential Privacy | arXiv | 2025 | Link |
| Residual Reweighted Conformal Prediction for Graph Neural Networks | arXiv | 2025 | Link |
| Rethinking Evaluation in the Era of Time Series Foundation Models: (Un)known Information Leakage Challenges | arXiv | 2025 | Link |
| Rethinking Federated Learning Over the Air: The Blessing of Scaling Up | arXiv | 2025 | Link |
| Rethinking Inference Placement for Deep Learning across Edge and Cloud Platforms: A Multi-Objective Optimization Perspective and Future Directions | arXiv | 2025 | Link |
| Rethinking Post-Unlearning Behavior of Large Vision-Language Models | arXiv | 2025 | Link |
| Rethinking Text-based Protein Understanding: Retrieval or LLM? | arXiv | 2025 | Link |
| Revealing Unintentional Information Leakage in Low-Dimensional Facial Portrait Representations | arXiv | 2025 | Link |
| Revisiting Gradient-based Uncertainty for Monocular Depth Estimation | arXiv | 2025 | Link |
| Revisiting Locally Differentially Private Protocols: Towards Better Trade-offs in Privacy, Utility, and Attack Resistance | arXiv | 2025 | Link |
| Revisiting Model Inversion Evaluation: From Misleading Standards to Reliable Privacy Assessment | arXiv | 2025 | Link |
| Revisiting Pre-trained Language Models for Vulnerability Detection | arXiv | 2025 | Link |
| Risk In Context: Benchmarking Privacy Leakage of Foundation Models in Synthetic Tabular Data Generation | arXiv | 2025 | Link |
| Risk-Aware Sensitive Property-Driven Resource Management in Cloud Datacenters | arXiv | 2025 | Link |
| Robust Full-Space Physical Layer Security for STAR-RIS-Aided Wireless Networks: Eavesdropper with Uncertain Location and Channel | arXiv | 2025 | Link |
| Robust Watermarks Leak: Channel-Aware Feature Extraction Enables Adversarial Watermark Manipulation | arXiv | 2025 | Link |
| RobustMerge: Parameter-Efficient Model Merging for MLLMs with Direction Robustness | arXiv | 2025 | Link |
| RodEpil: A Video Dataset of Laboratory Rodents for Seizure Detection and Benchmark Evaluation | arXiv | 2025 | Link |
| RouterKT: Mixture-of-Experts for Knowledge Tracing | arXiv | 2025 | Link |
| SAFE: Self-Adjustment Federated Learning Framework for Remote Sensing Collaborative Perception | arXiv | 2025 | Link |
| SALT: Steering Activations towards Leakage-free Thinking in Chain of Thought | arXiv | 2025 | Link |
| SALTY: Explainable Artificial Intelligence Guided Structural Analysis for Hardware Trojan Detection | arXiv | 2025 | Link |
| SECNEURON: Reliable and Flexible Abuse Control in Local LLMs via Hybrid Neuron Encryption | arXiv | 2025 | Link |
| SG-OIF: A Stability-Guided Online Influence Framework for Reliable Vision Data | arXiv | 2025 | Link |
| SHALE: A Scalable Benchmark for Fine-grained Hallucination Evaluation in LVLMs | arXiv | 2025 | Link |
| SHE-LoRA: Selective Homomorphic Encryption for Federated Tuning with Heterogeneous LoRA | arXiv | 2025 | Link |
| SLVC-DIDA: Signature-less Verifiable Credential-based Issuer-hiding and Multi-party Authentication for Decentralized Identity | arXiv | 2025 | Link |
| SMA: Who Said That? Auditing Membership Leakage in Semi-Black-box RAG Controlling | arXiv | 2025 | Link |
| SMOTE and Mirrors: Exposing Privacy Leakage from Synthetic Minority Oversampling | arXiv | 2025 | Link |
| SMTFL: Secure Model Training to Untrusted Participants in Federated Learning | arXiv | 2025 | Link |
| SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks | arXiv | 2025 | Link |
| SPADE: Spatial-Aware Denoising Network for Open-vocabulary Panoptic Scene Graph Generation with Long- and Local-range Context Reasoning | arXiv | 2025 | Link |
| SPATA: Systematic Pattern Analysis for Detailed and Transparent Data Cards | arXiv | 2025 | Link |
| SPEAR++: Scaling Gradient Inversion via Sparsely-Used Dictionary Learning | arXiv | 2025 | Link |
| SPLICE: Part-Level 3D Shape Editing from Local Semantic Extraction to Global Neural Mixing | arXiv | 2025 | Link |
| SVDefense: Effective Defense against Gradient Inversion Attacks via Singular Value Decomposition | arXiv | 2025 | Link |
| Safe and Certifiable AI Systems: Concepts, Challenges, and Lessons Learned | arXiv | 2025 | Link |
| SafeToolBench: Pioneering a Prospective Benchmark to Evaluating Tool Utilization Safety in LLMs | arXiv | 2025 | Link |
| Safeguard-by-Development: A Privacy-Enhanced Development Paradigm for Multi-Agent Collaboration Systems | arXiv | 2025 | Link |
| Safeguarding LLM Embeddings in End-Cloud Collaboration via Entropy-Driven Perturbation | arXiv | 2025 | Link |
| Sanitize Your Responses: Mitigating Privacy Leakage in Large Language Models | arXiv | 2025 | Link |
| SceneTextStylizer: A Training-Free Scene Text Style Transfer Framework with Diffusion Model | arXiv | 2025 | Link |
| Score Augmentation for Diffusion Models | arXiv | 2025 | Link |
| Secret Sharing for DNA Probability Vectors | arXiv | 2025 | Link |
| Secret-Key Generation from Private Identifiers under Channel Uncertainty | arXiv | 2025 | Link |
| Secure Generalization through Stochastic Bidirectional Parameter Updates Using Dual-Gradient Mechanism | arXiv | 2025 | Link |
| Secure Multi-LLM Agentic AI and Agentification for Edge General Intelligence by Zero-Trust: A Survey | arXiv | 2025 | Link |
| Secure Multifaceted-RAG for Enterprise: Hybrid Knowledge Retrieval with Security Filtering | arXiv | 2025 | Link |
| Secure and Privacy-Preserving Federated Learning for Next-Generation Underground Mine Safety | arXiv | 2025 | Link |
| Securing 5G Bootstrapping: A Two-Layer IBS Authentication Protocol | arXiv | 2025 | Link |
| Securing AI Systems: A Guide to Known Attacks and Impacts | arXiv | 2025 | Link |
| Securing P4 Programs by Information Flow Control | arXiv | 2025 | Link |
| Security Audit of intel ICE Driver for e810 Network Interface Card | arXiv | 2025 | Link |
| Security-aware Semantic-driven ISAC via Paired Adversarial Residual Networks | arXiv | 2025 | Link |
| Self-Supervised Temporal Super-Resolution of Energy Data using Generative Adversarial Transformer | arXiv | 2025 | Link |
| Selling Privacy in Blockchain Transactions | arXiv | 2025 | Link |
| SemCovert: Secure and Covert Video Transmission via Deep Semantic-Level Hiding | arXiv | 2025 | Link |
| SemiOccam: A Robust Semi-Supervised Image Recognition Network Using Sparse Labels | arXiv | 2025 | Link |
| SenseCrypt: Sensitivity-guided Selective Homomorphic Encryption for Joint Federated Learning in Cross-Device Scenarios | arXiv | 2025 | Link |
| Several Representations of $α$-Mutual Information and Interpretations as Privacy Leakage Measures | arXiv | 2025 | Link |
| Shadow defense against gradient inversion attack in federated learning | arXiv | 2025 | Link |
| Shadow in the Cache: Unveiling and Mitigating Privacy Risks of KV-cache in LLM Inference | arXiv | 2025 | Link |
| Sim-to-Real: An Unsupervised Noise Layer for Screen-Camera Watermarking Robustness | arXiv | 2025 | Link |
| Simple Yet Effective: Extracting Private Data Across Clients in Federated Fine-Tuning of Large Language Models | arXiv | 2025 | Link |
| Simulating Pattern Recognition Using Non-volatile Synapses: MRAM, Ferroelectrics and Magnetic Skyrmions | arXiv | 2025 | Link |
| Simulating Training Data Leakage in Multiple-Choice Benchmarks for LLM Evaluation | arXiv | 2025 | Link |
| Situating AI Agents in their World: Aspective Agentic AI for Dynamic Partially Observable Information Systems | arXiv | 2025 | Link |
| Smooth, Integrated Proofs of Cryptographic Constant Time for Nondeterministic Programs and Compilers | arXiv | 2025 | Link |
| SoK: The Privacy Paradox of Large Language Models: Advancements, Privacy Risks, and Mitigation | arXiv | 2025 | Link |
| SoK: Understanding (New) Security Issues Across AI4Code Use Cases | arXiv | 2025 | Link |
| Soiling detection for Advanced Driver Assistance Systems | arXiv | 2025 | Link |
| Sparse Latent Factor Forecaster (SLFF) with Iterative Inference for Transparent Multi-Horizon Commodity Futures Prediction | arXiv | 2025 | Link |
| Sparse Model Inversion: Efficient Inversion of Vision Transformers for Data-Free Applications | arXiv | 2025 | Link |
| Split Happens: Combating Advanced Threats with Split Learning and Function Secret Sharing | arXiv | 2025 | Link |
| Spurious Privacy Leakage in Neural Networks | arXiv | 2025 | Link |
| Stealing Training Data from Large Language Models in Decentralized Training through Activation Inversion Attack | arXiv | 2025 | Link |
| StegaVAR: Privacy-Preserving Video Action Recognition via Steganographic Domain Analysis | arXiv | 2025 | Link |
| Step-by-Step Reasoning Attack: Revealing 'Erased' Knowledge in Large Language Models | arXiv | 2025 | Link |
| Steps Adaptive Decay DPSGD: Enhancing Performance on Imbalanced Datasets with Differential Privacy with HAM10000 | arXiv | 2025 | Link |
| Strategic Incentivization for Locally Differentially Private Federated Learning | arXiv | 2025 | Link |
| Structural Enforcement of Statistical Rigor in AI-Driven Discovery: A Functional Architecture | arXiv | 2025 | Link |
| SurvBench: A Standardised Preprocessing Pipeline for Multi-Modal Electronic Health Record Survival Analysis | arXiv | 2025 | Link |
| Synth-MIA: A Testbed for Auditing Privacy Leakage in Tabular Data Synthesis | arXiv | 2025 | Link |
| SynthTextEval: Synthetic Text Data Generation and Evaluation for High-Stakes Domains | arXiv | 2025 | Link |
| Synthesis of Dynamic Masks for Information-Theoretic Opacity in Stochastic Systems | arXiv | 2025 | Link |
| Synthetic Data Can Mislead Evaluations: Membership Inference as Machine Text Detection | arXiv | 2025 | Link |
| System Prompt Poisoning: Persistent Attacks on Large Language Models Beyond User Injection | arXiv | 2025 | Link |
| TCC-Bench: Benchmarking the Traditional Chinese Culture Understanding Capabilities of MLLMs | arXiv | 2025 | Link |
| TEE-based Key-Value Stores: a Survey | arXiv | 2025 | Link |
| TRIDENT -- A Three-Tier Privacy-Preserving Propaganda Detection Model in Mobile Networks using Transformers, Adversarial Learning, and Differential Privacy | arXiv | 2025 | Link |
| TS-Arena -- A Live Forecast Pre-Registration Platform | arXiv | 2025 | Link |
| TS-Inverse: A Gradient Inversion Attack Tailored for Federated Time Series Forecasting Models | arXiv | 2025 | Link |
| TTSDS2: Resources and Benchmark for Evaluating Human-Quality Text to Speech Systems | arXiv | 2025 | Link |
| TabDSR: Decompose, Sanitize, and Reason for Complex Numerical Reasoning in Tabular Data | arXiv | 2025 | Link |
| TableEval: A Real-World Benchmark for Complex, Multilingual, and Multi-Structured Table Question Answering | arXiv | 2025 | Link |
| Tag&Tab: Pretraining Data Detection in Large Language Models Using Keyword-Based Membership Inference Attack | arXiv | 2025 | Link |
| Teach2Eval: An Indirect Evaluation Method for LLM by Judging How It Teaches | arXiv | 2025 | Link |
| Term2Note: Synthesising Differentially Private Clinical Notes from Medical Terms | arXiv | 2025 | Link |
| TextCrafter: Optimization-Calibrated Noise for Defending Against Text Embedding Inversion | arXiv | 2025 | Link |
| The DCR Delusion: Measuring the Privacy Risk of Synthetic Data | arXiv | 2025 | Link |
| The Decrypto Benchmark for Multi-Agent Reasoning and Theory of Mind | arXiv | 2025 | Link |
| The Double-Edged Nature of the Rashomon Set for Trustworthy Machine Learning | arXiv | 2025 | Link |
| The Ever-Evolving Science Exam | arXiv | 2025 | Link |
| The Hidden Cost of Correlation: Rethinking Privacy Leakage in Local Differential Privacy | arXiv | 2025 | Link |
| The Impact of Logic Locking on Confidentiality: An Automated Evaluation | arXiv | 2025 | Link |
| The Inverse Scaling Effect of Pre-Trained Language Model Surprisal Is Not Due to Data Leakage | arXiv | 2025 | Link |
| The Layout Is the Model: On Action-Item Coupling in Generative Recommendation | arXiv | 2025 | Link |
| The Model's Language Matters: A Comparative Privacy Analysis of LLMs | arXiv | 2025 | Link |
| The More You Automate, the Less You See: Hidden Pitfalls of AI Scientist Systems | arXiv | 2025 | Link |
| The More is not the Merrier: Investigating the Effect of Client Size on Federated Learning | arXiv | 2025 | Link |
| The Role of Review Process Failures in Affective State Estimation: An Empirical Investigation of DEAP Dataset | arXiv | 2025 | Link |
| The Sum Leaks More Than Its Parts: Compositional Privacy Risks and Mitigations in Multi-Agent Collaboration | arXiv | 2025 | Link |
| The Surprising Effectiveness of Membership Inference with Simple N-Gram Coverage | arXiv | 2025 | Link |
| The role of data partitioning on the performance of EEG-based deep learning models in supervised cross-subject analysis: a preliminary study | arXiv | 2025 | Link |
| Theoretical Insights in Model Inversion Robustness and Conditional Entropy Maximization for Collaborative Inference Systems | arXiv | 2025 | Link |
| Thermal-Aware 3D Design for Side-Channel Information Leakage | arXiv | 2025 | Link |
| ThinkBench: Dynamic Out-of-Distribution Evaluation for Robust LLM Reasoning | arXiv | 2025 | Link |
| Tight Inversion: Image-Conditioned Inversion for Real Image Editing | arXiv | 2025 | Link |
| TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems | arXiv | 2025 | Link |
| Time Travel is Cheating: Going Live with DeepFund for Real-Time Fund Investment Benchmarking | arXiv | 2025 | Link |
| Towards Adversarial Robustness and Uncertainty Quantification in DINOv2-based Few-Shot Anomaly Detection | arXiv | 2025 | Link |
| Towards Automated Self-Supervised Learning for Truly Unsupervised Graph Anomaly Detection | arXiv | 2025 | Link |
| Towards Benchmarking Privacy Vulnerabilities in Selective Forgetting with Large Language Models | arXiv | 2025 | Link |
| Towards Cross-Domain Multi-Targeted Adversarial Attacks | arXiv | 2025 | Link |
| Towards Federated Clustering: A Client-wise Private Graph Aggregation Framework | arXiv | 2025 | Link |
| Towards Human-Centered RegTech: Unpacking Professionals' Strategies and Needs for Using LLMs Safely | arXiv | 2025 | Link |
| Towards Secure Program Partitioning for Smart Contracts with LLM's In-Context Learning | arXiv | 2025 | Link |
| Towards Secure Semantic Communications in the Presence of Intelligent Eavesdroppers | arXiv | 2025 | Link |
| Towards a more realistic evaluation of machine learning models for bearing fault diagnosis | arXiv | 2025 | Link |
| Towards hyperparameter-free optimization with differential privacy | arXiv | 2025 | Link |
| Towards mitigating information leakage when evaluating safety monitors | arXiv | 2025 | Link |
| Tracking the Moving Target: A Framework for Continuous Evaluation of LLM Test Generation in Industry | arXiv | 2025 | Link |
| Training nonlinear optical neural networks with Scattering Backpropagation | arXiv | 2025 | Link |
| Transform Before You Query: A Privacy-Preserving Approach for Vector Retrieval with Embedding Space Alignment | arXiv | 2025 | Link |
| Trusted AI Agents in the Cloud | arXiv | 2025 | Link |
| Trustformer: A Trusted Federated Transformer | arXiv | 2025 | Link |
| Trustworthy Efficient Communication for Distributed Learning using LQ-SGD Algorithm | arXiv | 2025 | Link |
| Twin Peaks: Dual-Head Architecture for Structure-Free Prediction of Protein-Protein Binding Affinity and Mutation Effects | arXiv | 2025 | Link |
| UGPhysics: A Comprehensive Benchmark for Undergraduate Physics Reasoning with Large Language Models | arXiv | 2025 | Link |
| Unbiased estimation in one-parameter exponential families for the inverse of the natural parameter with extensions | arXiv | 2025 | Link |
| Uncovering Gradient Inversion Risks in Practical Language Model Training | arXiv | 2025 | Link |
| Uncovering Privacy Vulnerabilities through Analytical Gradient Inversion Attacks | arXiv | 2025 | Link |
| Understanding and Mitigating Cross-lingual Privacy Leakage via Language-specific and Universal Privacy Neurons | arXiv | 2025 | Link |
| Understanding the Mechanisms Behind Structural Influences on Link Prediction: A Case Study on FB15k-237 | arXiv | 2025 | Link |
| Understanding the Security Landscape of Embedded Non-Volatile Memories: A Comprehensive Survey | arXiv | 2025 | Link |
| Uniqueness ratio as a predictor of a privacy leakage | arXiv | 2025 | Link |
| Unlearned but Not Forgotten: Data Extraction after Exact Unlearning in LLM | arXiv | 2025 | Link |
| Unlearning Inversion Attacks for Graph Neural Networks | arXiv | 2025 | Link |
| Unmasking the Genuine Type Inference Capabilities of LLMs for Java Code Snippets | arXiv | 2025 | Link |
| Unveiling Client Privacy Leakage from Public Dataset Usage in Federated Distillation | arXiv | 2025 | Link |
| Using the NANDA Index Architecture in Practice: An Enterprise Perspective | arXiv | 2025 | Link |
| VAR-MATH: Probing True Mathematical Reasoning in LLMS via Symbolic Multi-Instance Benchmarks | arXiv | 2025 | Link |
| VFEFL: Privacy-Preserving Federated Learning against Malicious Clients via Verifiable Functional Encryption | arXiv | 2025 | Link |
| VFXMaster: Unlocking Dynamic Visual Effect Generation via In-Context Learning | arXiv | 2025 | Link |
| VMDNet: Time Series Forecasting with Leakage-Free Samplewise Variational Mode Decomposition and Multibranch Decoding | arXiv | 2025 | Link |
| Validating Vision Transformers for Otoscopy: Performance and Data-Leakage Effects | arXiv | 2025 | Link |
| Variational Secret Common Randomness Extraction | arXiv | 2025 | Link |
| Verifiable, Efficient and Confidentiality-Preserving Graph Search with Transparency | arXiv | 2025 | Link |
| Verification of Lightning Network Channel Balances with Trusted Execution Environments (TEE) | arXiv | 2025 | Link |
| VoxGuard: Evaluating User and Attribute Privacy in Speech via Membership Inference Attacks | arXiv | 2025 | Link |
| WarmFed: Federated Learning with Warm-Start for Globalization and Personalization Via Personalized Diffusion Models | arXiv | 2025 | Link |
| WavShape: Information-Theoretic Speech Representation Learning for Fair and Privacy-Aware Audio Processing | arXiv | 2025 | Link |
| Weakly Supervised Pneumonia Localization from Chest X-Rays Using Deep Neural Network and Grad-CAM Explanations | arXiv | 2025 | Link |
| What Your Features Reveal: Data-Efficient Black-Box Feature Inversion Attack for Split DNNs | arXiv | 2025 | Link |
| When Better Features Mean Greater Risks: The Performance-Privacy Trade-Off in Contrastive Learning | arXiv | 2025 | Link |
| When MoE Meets Blockchain: A Trustworthy Distributed Framework of Large Models | arXiv | 2025 | Link |
| When Privacy Isn't Synthetic: Hidden Data Leakage in Generative AI Models | arXiv | 2025 | Link |
| When Privacy Meets Recovery: The Overlooked Half of Surrogate-Driven Privacy Preservation for MLLM Editing | arXiv | 2025 | Link |
| When Secure Aggregation Falls Short: Achieving Long-Term Privacy in Asynchronous Federated Learning for LEO Satellite Networks | arXiv | 2025 | Link |
| When Tables Leak: Attacking String Memorization in LLM-Based Tabular Data Generation | arXiv | 2025 | Link |
| Who's Wearing? Ear Canal Biometric Key Extraction for User Authentication on Wireless Earbuds | arXiv | 2025 | Link |
| Will LLMs be Professional at Fund Investment? DeepFund: A Live Arena Perspective | arXiv | 2025 | Link |
| YOLO-IOD: Towards Real Time Incremental Object Detection | arXiv | 2025 | Link |
| You Have Been LaTeXpOsEd: A Systematic Analysis of Information Leakage in Preprint Archives Using Large Language Models | arXiv | 2025 | Link |
| ZTFed-MAS2S: A Zero-Trust Federated Learning Framework with Verifiable Privacy and Trust-Aware Aggregation for Wind Power Data Imputation | arXiv | 2025 | Link |
| Zk-SNARK for String Match | arXiv | 2025 | Link |
| zkFL-Health: Blockchain-Enabled Zero-Knowledge Federated Learning for Medical AI Privacy | arXiv | 2025 | Link |
2024
| Title | Venue | Year | Link |
|---|---|---|---|
| "Ghost of the past": identifying and resolving privacy leakage from LLM's memory through proactive user interaction | arXiv | 2024 | Link |
| "The teachers are confused as well": A Multiple-Stakeholder Ethics Discussion on Large Language Models in Computing Education | arXiv | 2024 | Link |
| "What do you want from theory alone?" Experimenting with Tight Auditing of Differentially Private Synthetic Data Generation | arXiv | 2024 | Link |
| 2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures | arXiv | 2024 | Link |
| 500xCompressor: Generalized Prompt Compression for Large Language Models | arXiv | 2024 | Link |
| A Benchmark for Multi-speaker Anonymization | arXiv | 2024 | Link |
| A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion Attacks | arXiv | 2024 | Link |
| A Computational Harmonic Detection Algorithm to Detect Data Leakage through EM Emanation | arXiv | 2024 | Link |
| A Curious Case of Remarkable Resilience to Gradient Attacks via Fully Convolutional and Differentiable Front End with a Skip Connection | arXiv | 2024 | Link |
| A Data-Driven Modeling and Motion Control of Heavy-Load Hydraulic Manipulators via Reversible Transformation | arXiv | 2024 | Link |
| A Deep Learning Approach for Trading Factor Residuals | arXiv | 2024 | Link |
| A Differentially Private Quantum Neural Network for Probabilistic Optimal Power Flow | arXiv | 2024 | Link |
| A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data Storage | arXiv | 2024 | Link |
| A Framework for Managing Multifaceted Privacy Leakage While Optimizing Utility in Continuous LBS Interactions | arXiv | 2024 | Link |
| A Hybrid Quantum Neural Network for Split Learning | arXiv | 2024 | Link |
| A Large-scale Empirical Study on Fine-tuning Large Language Models for Unit Testing | arXiv | 2024 | Link |
| A Little Leak Will Sink a Great Ship: Survey of Transparency for Large Language Models from Start to Finish | arXiv | 2024 | Link |
| A Low-Cost Multi-Band Waveform Security Framework in Resource-Constrained Communications | arXiv | 2024 | Link |
| A Method to Facilitate Membership Inference Attacks in Deep Learning Models | arXiv | 2024 | Link |
| A Multi-Faceted Evaluation Framework for Assessing Synthetic Data Generated by Large Language Models | arXiv | 2024 | Link |
| A New Achievable Region of the $K$-User MAC Wiretap Channel with Confidential and Open Messages Under Strong Secrecy | arXiv | 2024 | Link |
| A New Federated Learning Framework Against Gradient Inversion Attacks | arXiv | 2024 | Link |
| A Novel Review of Stability Techniques for Improved Privacy-Preserving Machine Learning | arXiv | 2024 | Link |
| A Practical Trigger-Free Backdoor Attack on Neural Networks | arXiv | 2024 | Link |
| A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web | arXiv | 2024 | Link |
| A Privacy-Preserving Framework with Multi-Modal Data for Cross-Domain Recommendation | arXiv | 2024 | Link |
| A Public and Reproducible Assessment of the Topics API on Real Data | arXiv | 2024 | Link |
| A Qualitative Analysis Framework for mHealth Privacy Practices | arXiv | 2024 | Link |
| A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality | arXiv | 2024 | Link |
| A Quantum Key Distribution System for Mobile Platforms with Highly Indistinguishable States | arXiv | 2024 | Link |
| A Simple Architecture for Enterprise Large Language Model Applications based on Role based security and Clearance Levels using Retrieval-Augmented Generation or Mixture of Experts | arXiv | 2024 | Link |
| A Study of Secure Algorithms for Vertical Federated Learning: Take Secure Logistic Regression as an Example | arXiv | 2024 | Link |
| A Superposition Code-Based Semantic Communication Approach with Quantifiable and Controllable Security | arXiv | 2024 | Link |
| A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions | arXiv | 2024 | Link |
| A Survey on Machine Unlearning: Techniques and New Emerged Privacy Risks | arXiv | 2024 | Link |
| A Survey on Privacy Attacks Against Digital Twin Systems in AI-Robotics | arXiv | 2024 | Link |
| A Survey on Privacy-Preserving Caching at Network Edge: Classification, Solutions, and Challenges | arXiv | 2024 | Link |
| A Systematic Literature Review on Reasons and Approaches for Accurate Effort Estimations in Agile | arXiv | 2024 | Link |
| A Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time Pad | arXiv | 2024 | Link |
| A Unified Solution to Diverse Heterogeneities in One-shot Federated Learning | arXiv | 2024 | Link |
| A Variational Characterization of $H$-Mutual Information and its Application to Computing $H$-Capacity | arXiv | 2024 | Link |
| A code-driven tutorial on encrypted control: From pioneering realizations to modern implementations | arXiv | 2024 | Link |
| A new "temperature inversion" estimator to detect CMB patchy screening by large-scale structure | arXiv | 2024 | Link |
| ACCESS-FL: Agile Communication and Computation for Efficient Secure Aggregation in Stable Federated Learning Networks | arXiv | 2024 | Link |
| AFGI: Towards Accurate and Fast-convergent Gradient Inversion Attack in Federated Learning | arXiv | 2024 | Link |
| AGSOA:Graph Neural Network Targeted Attack Based on Average Gradient and Structure Optimization | arXiv | 2024 | Link |
| AI in Investment Analysis: LLMs for Equity Stock Ratings | arXiv | 2024 | Link |
| ANGO: A Next-Level Evaluation Benchmark For Generation-Oriented Language Models In Chinese Domain | arXiv | 2024 | Link |
| Act Now: A Novel Online Forecasting Framework for Large-Scale Streaming Data | arXiv | 2024 | Link |
| Active Perception with Initial-State Uncertainty: A Policy Gradient Method | arXiv | 2024 | Link |
| Adaptive Coding for Two-Way Wiretap Channel under Strong Secrecy | arXiv | 2024 | Link |
| Adaptive Hybrid Masking Strategy for Privacy-Preserving Face Recognition Against Model Inversion Attack | arXiv | 2024 | Link |
| Adaptive and Parallel Split Federated Learning in Vehicular Edge Computing | arXiv | 2024 | Link |
| Addressing Data Leakage in HumanEval Using Combinatorial Test Design | arXiv | 2024 | Link |
| Addressing Key Challenges of Adversarial Attacks and Defenses in the Tabular Domain: A Methodological Framework for Coherence and Consistency | arXiv | 2024 | Link |
| Advancements in Recommender Systems: A Comprehensive Analysis Based on Data, Algorithms, and Evaluation | arXiv | 2024 | Link |
| Adversarial Machine Learning-Enabled Anonymization of OpenWiFi Data | arXiv | 2024 | Link |
| Against All Odds: Overcoming Typology, Script, and Language Confusion in Multilingual Embedding Inversion Attacks | arXiv | 2024 | Link |
| Agile gesture recognition for low-power applications: customisation for generalisation | arXiv | 2024 | Link |
| AirGapAgent: Protecting Privacy-Conscious Conversational Agents | arXiv | 2024 | Link |
| Alopex: A Computational Framework for Enabling On-Device Function Calls with LLMs | arXiv | 2024 | Link |
| An Empirical Study of Vulnerability Detection using Federated Learning | arXiv | 2024 | Link |
| An Improved Metric and Benchmark for Assessing the Performance of Virtual Screening Models | arXiv | 2024 | Link |
| Analysis of Privacy Leakage in Federated Large Language Models | arXiv | 2024 | Link |
| Analyzing Inference Privacy Risks Through Gradients in Machine Learning | arXiv | 2024 | Link |
| Anatomical 3D Style Transfer Enabling Efficient Federated Learning with Extremely Low Communication Costs | arXiv | 2024 | Link |
| AnonyNoise: Anonymizing Event Data with Smart Noise to Outsmart Re-Identification and Preserve Privacy | arXiv | 2024 | Link |
| AnyFit: Controllable Virtual Try-on for Any Combination of Attire Across Any Scenario | arXiv | 2024 | Link |
| Approximated Coded Computing: Towards Fast, Private and Secure Distributed Machine Learning | arXiv | 2024 | Link |
| Are Large Language Models Memorizing Bug Benchmarks? | arXiv | 2024 | Link |
| Are Neuromorphic Architectures Inherently Privacy-preserving? An Exploratory Study | arXiv | 2024 | Link |
| Are We on the Right Way for Evaluating Large Vision-Language Models? | arXiv | 2024 | Link |
| ArtNVG: Content-Style Separated Artistic Neighboring-View Gaussian Stylization | arXiv | 2024 | Link |
| Assessing Gender Bias in LLMs: Comparing LLM Outputs with Human Perceptions and Official Statistics | arXiv | 2024 | Link |
| Assessing Privacy Compliance of Android Third-Party SDKs | arXiv | 2024 | Link |
| Asynchronous Byzantine Federated Learning | arXiv | 2024 | Link |
| Asynchronous Federated Stochastic Optimization for Heterogeneous Objectives Under Arbitrary Delays | arXiv | 2024 | Link |
| Attack-Aware Noise Calibration for Differential Privacy | arXiv | 2024 | Link |
| Attribute Inference Attacks for Federated Regression Tasks | arXiv | 2024 | Link |
| Audio-Language Datasets of Scenes and Events: A Survey | arXiv | 2024 | Link |
| Auditing Private Prediction | arXiv | 2024 | Link |
| Augmented two-stage estimation for treatment crossover in oncology trials: Leveraging external data for improved precision | arXiv | 2024 | Link |
| AutoPT: How Far Are We from the End2End Automated Web Penetration Testing? | arXiv | 2024 | Link |
| BAZAM: A Blockchain-Assisted Zero-Trust Authentication in Multi-UAV Wireless Networks | arXiv | 2024 | Link |
| BGTplanner: Maximizing Training Accuracy for Differentially Private Federated Recommenders via Strategic Privacy Budget Allocation | arXiv | 2024 | Link |
| BWArea Model: Learning World Model, Inverse Dynamics, and Policy for Controllable Language Generation | arXiv | 2024 | Link |
| Balancing Innovation and Privacy: Data Security Strategies in Natural Language Processing Applications | arXiv | 2024 | Link |
| Barycentric and Pairwise Renyi Quantum Leakage | arXiv | 2024 | Link |
| Bayesian D-Optimal Experimental Designs via Column Subset Selection | arXiv | 2024 | Link |
| Benchmarking Benchmark Leakage in Large Language Models | arXiv | 2024 | Link |
| Benchmarking LLMs' Judgments with No Gold Standard | arXiv | 2024 | Link |
| Benchmarking Secure Sampling Protocols for Differential Privacy | arXiv | 2024 | Link |
| Benchmarking deep learning models for bearing fault diagnosis using the CWRU dataset: A multi-label approach | arXiv | 2024 | Link |
| Better Membership Inference Privacy Measurement through Discrepancy | arXiv | 2024 | Link |
| Blockchain-Enabled Variational Information Bottleneck for Data Extraction Based on Mutual Information in Internet of Vehicles | arXiv | 2024 | Link |
| Boosting Communication Efficiency of Federated Learning's Secure Aggregation | arXiv | 2024 | Link |
| Boosting Spatial-Spectral Masked Auto-Encoder Through Mining Redundant Spectra for HSI-SAR/LiDAR Classification | arXiv | 2024 | Link |
| Bounding Causal Effects with Leaky Instruments | arXiv | 2024 | Link |
| BrainLeaks: On the Privacy-Preserving Properties of Neuromorphic Architectures against Model Inversion Attacks | arXiv | 2024 | Link |
| Breach By A Thousand Leaks: Unsafe Information Leakage in `Safe' AI Responses | arXiv | 2024 | Link |
| Breaking Resource Barriers in Speech Emotion Recognition via Data Distillation | arXiv | 2024 | Link |
| Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning | arXiv | 2024 | Link |
| Breaking the Black-Box: Confidence-Guided Model Inversion Attack for Distribution Shift | arXiv | 2024 | Link |
| Bridging Privacy and Robustness for Trustworthy Machine Learning | arXiv | 2024 | Link |
| Budget Recycling Differential Privacy | arXiv | 2024 | Link |
| Building Gradient Bridges: Label Leakage from Restricted Gradient Sharing in Federated Learning | arXiv | 2024 | Link |
| CFVNet: An End-to-End Cancelable Finger Vein Network for Recognition | arXiv | 2024 | Link |
| CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion | arXiv | 2024 | Link |
| CIF-Bench: A Chinese Instruction-Following Benchmark for Evaluating the Generalizability of Large Language Models | arXiv | 2024 | Link |
| CREF: An LLM-based Conversational Software Repair Framework for Programming Tutors | arXiv | 2024 | Link |
| CURATE: Scaling-up Differentially Private Causal Graph Discovery | arXiv | 2024 | Link |
| Can Graph Neural Networks Expose Training Data Properties? An Efficient Risk Assessment Approach | arXiv | 2024 | Link |
| Can LLMs Learn New Concepts Incrementally without Forgetting? | arXiv | 2024 | Link |
| Can LLMs get help from other LLMs without revealing private information? | arXiv | 2024 | Link |
| Can Large Language Models Automatically Jailbreak GPT-4V? | arXiv | 2024 | Link |
| Can Quantum Computers Do Nothing? | arXiv | 2024 | Link |
| Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM | arXiv | 2024 | Link |
| CausalVE: Face Video Privacy Encryption via Causal Video Prediction | arXiv | 2024 | Link |
| Chaos in Motion: Unveiling Robustness in Remote Heart Rate Measurement through Brain-Inspired Skin Tracking | arXiv | 2024 | Link |
| Clients Collaborate: Flexible Differentially Private Federated Learning with Guaranteed Improvement of Utility-Privacy Trade-off | arXiv | 2024 | Link |
| ClinicalLab: Aligning Agents for Multi-Departmental Clinical Diagnostics in the Real World | arXiv | 2024 | Link |
| Cluster-Enhanced Federated Graph Neural Network for Recommendation | arXiv | 2024 | Link |
| Cobblestone: A Divide-and-Conquer Approach for Automating Formal Verification | arXiv | 2024 | Link |
| Codev-Bench: How Do LLMs Understand Developer-Centric Code Completion? | arXiv | 2024 | Link |
| Collaborative Automatic Modulation Classification via Deep Edge Inference for Hierarchical Cognitive Radio Networks | arXiv | 2024 | Link |
| Communication-robust and Privacy-safe Distributed Estimation for Heterogeneous Community-level Behind-the-meter Solar Power Generation | arXiv | 2024 | Link |
| ComplexCodeEval: A Benchmark for Evaluating Large Code Models on More Complex Code | arXiv | 2024 | Link |
| Condensed Data Expansion Using Model Inversion for Knowledge Distillation | arXiv | 2024 | Link |
| Considerate Ramp Secret Sharing | arXiv | 2024 | Link |
| Consistent Update Synthesis via Privatized Beliefs | arXiv | 2024 | Link |
| Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data | arXiv | 2024 | Link |
| Contrastive Graph Condensation: Advancing Data Versatility through Self-Supervised Learning | arXiv | 2024 | Link |
| Convergent Differential Privacy Analysis for General Federated Learning: the $f$-DP Perspective | arXiv | 2024 | Link |
| Correctness Verification of Neural Networks Approximating Differential Equations | arXiv | 2024 | Link |
| Curator Attack: When Blackbox Differential Privacy Auditing Loses Its Power | arXiv | 2024 | Link |
| DAFT-GAN: Dual Affine Transformation Generative Adversarial Network for Text-Guided Image Inpainting | arXiv | 2024 | Link |
| DAGER: Exact Gradient Inversion for Large Language Models | arXiv | 2024 | Link |
| DATransNet: Dynamic Attention Transformer Network for Infrared Small Target Detection | arXiv | 2024 | Link |
| DEFAME: Dynamic Evidence-based FAct-checking with Multimodal Experts | arXiv | 2024 | Link |
| DESIRE: Dynamic Knowledge Consolidation for Rehearsal-Free Continual Learning | arXiv | 2024 | Link |
| DM4Steal: Diffusion Model For Link Stealing Attack On Graph Neural Networks | arXiv | 2024 | Link |
| DR-Encoder: Encode Low-rank Gradients with Random Prior for Large Language Models Differentially Privately | arXiv | 2024 | Link |
| DRL-Based Resource Allocation for Motion Blur Resistant Federated Self-Supervised Learning in IoV | arXiv | 2024 | Link |
| Data Lineage Inference: Uncovering Privacy Vulnerabilities of Dataset Pruning | arXiv | 2024 | Link |
| Data Reconstruction Attacks and Defenses: A Systematic Evaluation | arXiv | 2024 | Link |
| Dataset Condensation Driven Machine Unlearning | arXiv | 2024 | Link |
| Dataset Size Recovery from LoRA Weights | arXiv | 2024 | Link |
| DeMem: Privacy-Enhanced Robust Adversarial Learning via De-Memorization | arXiv | 2024 | Link |
| Dealing Doubt: Unveiling Threat Models in Gradient Inversion Attacks under Federated Learning, A Survey and Taxonomy | arXiv | 2024 | Link |
| DebugBench: Evaluating Debugging Capability of Large Language Models | arXiv | 2024 | Link |
| Decaf: Data Distribution Decompose Attack against Federated Learning | arXiv | 2024 | Link |
| Decentralised, Collaborative, and Privacy-preserving Machine Learning for Multi-Hospital Data | arXiv | 2024 | Link |
| Decentralized Collaborative Learning Framework with External Privacy Leakage Analysis | arXiv | 2024 | Link |
| Decentralized Federated Anomaly Detection in Smart Grids: A P2P Gossip Approach | arXiv | 2024 | Link |
| Decentralized Nonconvex Robust Optimization over Unsafe Multiagent Systems: System Modeling, Utility, Resilience, and Privacy Analysis | arXiv | 2024 | Link |
| Decentralized Proactive Model Offloading and Resource Allocation for Split and Federated Learning | arXiv | 2024 | Link |
| Decoding Secret Memorization in Code LLMs Through Token-Level Characterization | arXiv | 2024 | Link |
| Decoupled Federated Learning on Long-Tailed and Non-IID data with Feature Statistics | arXiv | 2024 | Link |
| Deep Joint Source Channel Coding for Privacy-Aware End-to-End Image Transmission | arXiv | 2024 | Link |
| Deep Learning Model Security: Threats and Defenses | arXiv | 2024 | Link |
| Deep Privacy Funnel Model: From a Discriminative to a Generative Approach with an Application to Face Recognition | arXiv | 2024 | Link |
| Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach | arXiv | 2024 | Link |
| Defending Against Neural Network Model Inversion Attacks via Data Poisoning | arXiv | 2024 | Link |
| Defending Membership Inference Attacks via Privacy-aware Sparsity Tuning | arXiv | 2024 | Link |
| Defending against Data Poisoning Attacks in Federated Learning via User Elimination | arXiv | 2024 | Link |
| Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement | arXiv | 2024 | Link |
| Detachment Problem -- Application in Prevention of Information Leakage in Stock Markets | arXiv | 2024 | Link |
| Detecting and Understanding the Promotion of Illicit Goods and Services on Twitter | arXiv | 2024 | Link |
| Developer Perspectives on Licensing and Copyright Issues Arising from Generative AI for Software Development | arXiv | 2024 | Link |
| Development and Validation of a Large Language Model for Generating Fully-Structured Radiology Reports | arXiv | 2024 | Link |
| Differential Privacy Preserving Distributed Quantum Computing | arXiv | 2024 | Link |
| Differential Privacy in Continual Learning: Which Labels to Update? | arXiv | 2024 | Link |
| Differential privacy enables fair and accurate AI-based analysis of speech disorders while protecting patient data | arXiv | 2024 | Link |
| Differentially Private Distributed Inference | arXiv | 2024 | Link |
| Differentially Private Distributed Nonconvex Stochastic Optimization with Quantized Communication | arXiv | 2024 | Link |
| Differentially Private Estimation of Weighted Average Treatment Effects for Binary Outcomes | arXiv | 2024 | Link |
| Differentially Private Federated Learning without Noise Addition: When is it Possible? | arXiv | 2024 | Link |
| Differentially Private Graph Diffusion with Applications in Personalized PageRanks | arXiv | 2024 | Link |
| Differentially Private Spatiotemporal Trajectory Synthesis with Retained Data Utility | arXiv | 2024 | Link |
| Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks | arXiv | 2024 | Link |
| Distinctive and Natural Speaker Anonymization via Singular Value Transformation-assisted Matrix | arXiv | 2024 | Link |
| Distributed Swarm Learning for Edge Internet of Things | arXiv | 2024 | Link |
| Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning | arXiv | 2024 | Link |
| Don't Push the Button! Exploring Data Leakage Risks in Machine Learning and Transfer Learning | arXiv | 2024 | Link |
| Driving Privacy Forward: Mitigating Information Leakage within Smart Vehicles through Synthetic Data Generation | arXiv | 2024 | Link |
| Dullahan: Stealthy Backdoor Attack against Without-Label-Sharing Split Learning | arXiv | 2024 | Link |
| Dysca: A Dynamic and Scalable Benchmark for Evaluating Perception Ability of LVLMs | arXiv | 2024 | Link |
| E2ED^2:Direct Mapping from Noise to Data for Enhanced Diffusion Models | arXiv | 2024 | Link |
| EIA: Environmental Injection Attack on Generalist Web Agents for Privacy Leakage | arXiv | 2024 | Link |
| EM-MIAs: Enhancing Membership Inference Attacks in Large Language Models through Ensemble Modeling | arXiv | 2024 | Link |
| EMIT: Micro-Invasive Database Configuration Tuning | arXiv | 2024 | Link |
| EarthquakeNPP: A Benchmark for Earthquake Forecasting with Neural Point Processes | arXiv | 2024 | Link |
| Eavesdropping on Goal-Oriented Communication: Timing Attacks and Countermeasures | arXiv | 2024 | Link |
| Edge Learning Based Collaborative Automatic Modulation Classification for Hierarchical Cognitive Radio Networks | arXiv | 2024 | Link |
| EdgeLeakage: Membership Information Leakage in Distributed Edge Intelligence Systems | arXiv | 2024 | Link |
| Edinburgh Clinical NLP at SemEval-2024 Task 2: Fine-tune your model unless you have access to GPT-4 | arXiv | 2024 | Link |
| Efficient Brain Imaging Analysis for Alzheimer's and Dementia Detection Using Convolution-Derivative Operations | arXiv | 2024 | Link |
| Efficient Privacy-Preserving KAN Inference Using Homomorphic Encryption | arXiv | 2024 | Link |
| Efficient and Personalized Mobile Health Event Prediction via Small Language Models | arXiv | 2024 | Link |
| Efficient and Private: Memorisation under differentially private parameter-efficient fine-tuning in language models | arXiv | 2024 | Link |
| Efficiently Assemble Normalization Layers and Regularization for Federated Domain Generalization | arXiv | 2024 | Link |
| Eguard: Defending LLM Embeddings Against Inversion Attacks via Text Mutual Information Optimization | arXiv | 2024 | Link |
| Eliminating Information Leakage in Hard Concept Bottleneck Models with Supervised, Hierarchical Concept Learning | arXiv | 2024 | Link |
| EnIGMA: Interactive Tools Substantially Assist LM Agents in Finding Security Vulnerabilities | arXiv | 2024 | Link |
| Enhancing Data Privacy in Large Language Models through Private Association Editing | arXiv | 2024 | Link |
| Enhancing Data Quality through Simple De-duplication: Navigating Responsible Computational Social Science Research | arXiv | 2024 | Link |
| Enhancing Federated Learning with Adaptive Differential Privacy and Priority-Based Aggregation | arXiv | 2024 | Link |
| Enhancing Graph Self-Supervised Learning with Graph Interplay | arXiv | 2024 | Link |
| Enhancing Privacy in Face Analytics Using Fully Homomorphic Encryption | arXiv | 2024 | Link |
| Enhancing Privacy in Federated Learning through Quantum Teleportation Integration | arXiv | 2024 | Link |
| Enhancing Privacy of Spatiotemporal Federated Learning against Gradient Inversion Attacks | arXiv | 2024 | Link |
| Enhancing Security Using Random Binary Weights in Privacy-Preserving Federated Learning | arXiv | 2024 | Link |
| Ensembler: Protect Collaborative Inference Privacy from Model Inversion Attack via Selective Ensemble | arXiv | 2024 | Link |
| Estimating Privacy Leakage of Augmented Contextual Knowledge in Language Models | arXiv | 2024 | Link |
| Ethos: Rectifying Language Models in Orthogonal Parameter Space | arXiv | 2024 | Link |
| Evaluating Language Model Agency through Negotiations | arXiv | 2024 | Link |
| Evaluations of Machine Learning Privacy Defenses are Misleading | arXiv | 2024 | Link |
| EventSum: A Large-Scale Event-Centric Summarization Dataset for Chinese Multi-News Documents | arXiv | 2024 | Link |
| EvoCodeBench: An Evolving Code Generation Benchmark Aligned with Real-World Code Repositories | arXiv | 2024 | Link |
| EvoCodeBench: An Evolving Code Generation Benchmark with Domain-Specific Evaluations | arXiv | 2024 | Link |
| Expiring opacity problems in parametric timed automata | arXiv | 2024 | Link |
| Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite | arXiv | 2024 | Link |
| Exploiting the Lock: Leveraging MiG-V's Logic Locking for Secret-Data Extraction | arXiv | 2024 | Link |
| Exploring User-level Gradient Inversion with a Diffusion Prior | arXiv | 2024 | Link |
| Exploring the Uncoordinated Privacy Protections of Eye Tracking and VR Motion Data for Unauthorized User Identification | arXiv | 2024 | Link |
| Extracting Prompts by Inverting LLM Outputs | arXiv | 2024 | Link |
| Extracting Spatiotemporal Data from Gradients with Large Language Models | arXiv | 2024 | Link |
| Extracting Training Data from Unconditional Diffusion Models | arXiv | 2024 | Link |
| F-Fidelity: A Robust Framework for Faithfulness Evaluation of Explainable AI | arXiv | 2024 | Link |
| FEDLAD: Federated Evaluation of Deep Leakage Attacks and Defenses | arXiv | 2024 | Link |
| FGAD: Self-boosted Knowledge Distillation for An Effective Federated Graph Anomaly Detection Framework | arXiv | 2024 | Link |
| FL-DABE-BC: A Privacy-Enhanced, Decentralized Authentication, and Secure Communication for Federated Learning Framework with Decentralized Attribute-Based Encryption and Blockchain for IoT Scenarios | arXiv | 2024 | Link |
| Facebook Report on Privacy of fNIRS data | arXiv | 2024 | Link |
| Fast Partition-Based Cross-Validation With Centering and Scaling for $\mathbf{X}^\mathbf{T}\mathbf{X}$ and $\mathbf{X}^\mathbf{T}\mathbf{Y}$ | arXiv | 2024 | Link |
| Fault-tolerant and secure long-distance quantum communication via uncorrectable-error-injection | arXiv | 2024 | Link |
| Feature-based Federated Transfer Learning: Communication Efficiency, Robustness and Privacy | arXiv | 2024 | Link |
| FedAdOb: Privacy-Preserving Federated Deep Learning with Adaptive Obfuscation | arXiv | 2024 | Link |
| FedCross: Intertemporal Federated Learning Under Evolutionary Games | arXiv | 2024 | Link |
| FedDP: Privacy-preserving method based on federated learning for histopathology image segmentation | arXiv | 2024 | Link |
| FedDTPT: Federated Discrete and Transferable Prompt Tuning for Black-Box Large Language Models | arXiv | 2024 | Link |
| FedEval-LLM: Federated Evaluation of Large Language Models on Downstream Tasks with Collective Wisdom | arXiv | 2024 | Link |
| FedGIG: Graph Inversion from Gradient in Federated Learning | arXiv | 2024 | Link |
| FedHide: Federated Learning by Hiding in the Neighbors | arXiv | 2024 | Link |
| FedSC: Provable Federated Self-supervised Learning with Spectral Contrastive Objective over Non-i.i.d. Data | arXiv | 2024 | Link |
| Federated Anomaly Detection for Early-Stage Diagnosis of Autism Spectrum Disorders using Serious Game Data | arXiv | 2024 | Link |
| Federated Cubic Regularized Newton Learning with Sparsification-amplified Differential Privacy | arXiv | 2024 | Link |
| Federated Domain Generalization via Prompt Learning and Aggregation | arXiv | 2024 | Link |
| Federated In-Context LLM Agent Learning | arXiv | 2024 | Link |
| Federated Learning Nodes Can Reconstruct Peers' Image Data | arXiv | 2024 | Link |
| Federated Learning and Evolutionary Game Model for Fog Federation Formation | arXiv | 2024 | Link |
| Federated Learning for Data Market: Shapley-UCB for Seller Selection and Incentives | arXiv | 2024 | Link |
| Federated Learning under Attack: Improving Gradient Inversion for Batch of Images | arXiv | 2024 | Link |
| Federated Unlearning with Gradient Descent and Conflict Mitigation | arXiv | 2024 | Link |
| Federated User Preference Modeling for Privacy-Preserving Cross-Domain Recommendation | arXiv | 2024 | Link |
| FhGenie: A Custom, Confidentiality-preserving Chat AI for Corporate and Scientific Use | arXiv | 2024 | Link |
| Fine-Tuning, Quantization, and LLMs: Navigating Unintended Outcomes | arXiv | 2024 | Link |
| Fluent: Round-efficient Secure Aggregation for Private Federated Learning | arXiv | 2024 | Link |
| ForecastBench: A Dynamic Benchmark of AI Forecasting Capabilities | arXiv | 2024 | Link |
| Forget to Flourish: Leveraging Machine-Unlearning on Pretrained Language Models for Privacy Leakage | arXiv | 2024 | Link |
| Formal Verification of Digital Twins with TLA and Information Leakage Control | arXiv | 2024 | Link |
| From Epilepsy Seizures Classification to Detection: A Deep Learning-based Approach for Raw EEG Signals | arXiv | 2024 | Link |
| From Mean to Extreme: Formal Differential Privacy Bounds on the Success of Real-World Data Reconstruction Attacks | arXiv | 2024 | Link |
| GAMformer: Bridging Tabular Foundation Models and Interpretable Machine Learning | arXiv | 2024 | Link |
| GAOKAO-Eval: Does high scores truly reflect strong capabilities in LLMs? | arXiv | 2024 | Link |
| GI-NAS: Boosting Gradient Inversion Attacks Through Adaptive Neural Architecture Search | arXiv | 2024 | Link |
| GI-PIP: Do We Require Impractical Auxiliary Dataset for Gradient Inversion Attacks? | arXiv | 2024 | Link |
| GI-SMN: Gradient Inversion Attack against Federated Learning without Prior Knowledge | arXiv | 2024 | Link |
| Game-Theoretic Machine Unlearning: Mitigating Extra Privacy Leakage | arXiv | 2024 | Link |
| Gaussian Ensemble Belief Propagation for Efficient Inference in High-Dimensional Systems | arXiv | 2024 | Link |
| GeFL: Model-Agnostic Federated Learning with Generative Models | arXiv | 2024 | Link |
| Geminio: Language-Guided Gradient Inversion Attacks in Federated Learning | arXiv | 2024 | Link |
| Generative AI for Secure and Privacy-Preserving Mobile Crowdsensing | arXiv | 2024 | Link |
| Gibberish is All You Need for Membership Inference Detection in Contrastive Language-Audio Pretraining | arXiv | 2024 | Link |
| Goal oriented optimal design of infinite-dimensional Bayesian inverse problems using quadratic approximations | arXiv | 2024 | Link |
| Gradient Inversion Attack on Graph Neural Networks | arXiv | 2024 | Link |
| Gradient Inversion of Federated Diffusion Models | arXiv | 2024 | Link |
| GraphTheft: Quantifying Privacy Risks in Graph Prompt Learning | arXiv | 2024 | Link |
| Guaranteeing Data Privacy in Federated Unlearning with Dynamic User Participation | arXiv | 2024 | Link |
| HARE: HumAn pRiors, a key to small language model Efficiency | arXiv | 2024 | Link |
| HARMONIC: Harnessing LLMs for Tabular Data Synthesis and Privacy Protection | arXiv | 2024 | Link |
| Heterogeneous Federated Learning with Splited Language Model | arXiv | 2024 | Link |
| HiddenSpeaker: Generate Imperceptible Unlearnable Audios for Speaker Verification System | arXiv | 2024 | Link |
| High Epsilon Synthetic Data Vulnerabilities in MST and PrivBayes | arXiv | 2024 | Link |
| Hotfixing Large Language Models for Code | arXiv | 2024 | Link |
| How Do Your Code LLMs Perform? Empowering Code Instruction Tuning with High-Quality Data | arXiv | 2024 | Link |
| How Reliable is Your Simulator? Analysis on the Limitations of Current LLM-based User Simulators for Conversational Recommendation | arXiv | 2024 | Link |
| How to Privately Tune Hyperparameters in Federated Learning? Insights from a Benchmark Study | arXiv | 2024 | Link |
| Hyperparameter Optimization for SecureBoost via Constrained Multi-Objective Federated Learning | arXiv | 2024 | Link |
| IDEA: A Flexible Framework of Certified Unlearning for Graph Neural Networks | arXiv | 2024 | Link |
| If you can describe it, they can see it: Cross-Modal Learning of Visual Concepts from Textual Descriptions | arXiv | 2024 | Link |
| Imitation Learning for Adaptive Video Streaming with Future Adversarial Information Bottleneck Principle | arXiv | 2024 | Link |
| Immersion and Invariance-based Coding for Privacy-Preserving Federated Learning | arXiv | 2024 | Link |
| Impact of Leakage on Data Harmonization in Machine Learning Pipelines in Class Imbalance Across Sites | arXiv | 2024 | Link |
| Impact of Sampling Techniques and Data Leakage on XGBoost Performance in Credit Card Fraud Detection | arXiv | 2024 | Link |
| Importance of Disjoint Sampling in Conventional and Transformer Models for Hyperspectral Image Classification | arXiv | 2024 | Link |
| Improving Image Data Leakage Detection in Automotive Software | arXiv | 2024 | Link |
| Improving Robustness to Model Inversion Attacks via Sparse Coding Architectures | arXiv | 2024 | Link |
| Improving the Transferability of Adversarial Examples by Feature Augmentation | arXiv | 2024 | Link |
| IncogniText: Privacy-enhancing Conditional Text Anonymization via LLM-based Private Attribute Randomization | arXiv | 2024 | Link |
| Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks | arXiv | 2024 | Link |
| Inference Attacks Against Face Recognition Model without Classification Layers | arXiv | 2024 | Link |
| Inferentially-Private Private Information | arXiv | 2024 | Link |
| Information Density Bounds for Privacy | arXiv | 2024 | Link |
| Information Leakage Detection through Approximate Bayes-optimal Prediction | arXiv | 2024 | Link |
| Information Leakage from Embedding in Large Language Models | arXiv | 2024 | Link |
| Information Leakage through Physical Layer Supply Voltage Coupling Vulnerability | arXiv | 2024 | Link |
| InjecGuard: Benchmarking and Mitigating Over-defense in Prompt Injection Guardrail Models | arXiv | 2024 | Link |
| Inside the Black Box: Detecting Data Leakage in Pre-trained Language Encoders | arXiv | 2024 | Link |
| Insights and Current Gaps in Open-Source LLM Vulnerability Scanners: A Comparative Analysis | arXiv | 2024 | Link |
| Interactive Visual Assessment for Text-to-Image Generation Models | arXiv | 2024 | Link |
| Inverse-Q*: Token Level Reinforcement Learning for Aligning Large Language Models Without Preference Data | arXiv | 2024 | Link |
| Inverting Gradient Attacks Makes Powerful Data Poisoning | arXiv | 2024 | Link |
| Investigating Privacy Leakage in Dimensionality Reduction Methods via Reconstruction Attack | arXiv | 2024 | Link |
| Investigating the Quality of DermaMNIST and Fitzpatrick17k Dermatological Image Datasets | arXiv | 2024 | Link |
| Is Diffusion Model Safe? Severe Data Leakage via Gradient-Guided Diffusion Model | arXiv | 2024 | Link |
| Is Your LLM Outdated? A Deep Look at Temporal Generalization | arXiv | 2024 | Link |
| It's Our Loss: No Privacy Amplification for Hidden State DP-SGD With Non-Convex Loss | arXiv | 2024 | Link |
| IterGen: Iterative Semantic-aware Structured LLM Generation with Backtracking | arXiv | 2024 | Link |
| KnFu: Effective Knowledge Fusion | arXiv | 2024 | Link |
| Knowledge Distillation-Based Model Extraction Attack using GAN-based Private Counterfactual Explanations | arXiv | 2024 | Link |
| KnowledgeSG: Privacy-Preserving Synthetic Text Generation with Knowledge Distillation from Server | arXiv | 2024 | Link |
| LDPKiT: Superimposing Remote Queries for Privacy-Preserving Local Model Training | arXiv | 2024 | Link |
| LEAP: Optimization Hierarchical Federated Learning on Non-IID Data with Coalition Formation Game | arXiv | 2024 | Link |
| LLM-PBE: Assessing Data Privacy in Large Language Models | arXiv | 2024 | Link |
| LLMArena: Assessing Capabilities of Large Language Models in Dynamic Multi-Agent Environments | arXiv | 2024 | Link |
| LLMJudge: LLMs for Relevance Judgments | arXiv | 2024 | Link |
| LabObf: A Label Protection Scheme for Vertical Federated Learning Through Label Obfuscation | arXiv | 2024 | Link |
| Lancelot: Towards Efficient and Privacy-Preserving Byzantine-Robust Federated Learning within Fully Homomorphic Encryption | arXiv | 2024 | Link |
| Language-Queried Target Sound Extraction Without Parallel Training Data | arXiv | 2024 | Link |
| Large Language Models are Easily Confused: A Quantitative Metric, Security Implications and Typological Analysis | arXiv | 2024 | Link |
| Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols | arXiv | 2024 | Link |
| Large-scale, Independent and Comprehensive study of the power of LLMs for test case generation | arXiv | 2024 | Link |
| Larimar: Large Language Models with Episodic Memory Control | arXiv | 2024 | Link |
| Leak and Learn: An Attacker's Cookbook to Train Using Leaked Data from Federated Learning | arXiv | 2024 | Link |
| LeakAgent: RL-based Red-teaming Agent for LLM Privacy Leakage | arXiv | 2024 | Link |
| Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning | arXiv | 2024 | Link |
| Learning Privacy-Preserving Student Networks via Discriminative-Generative Distillation | arXiv | 2024 | Link |
| Learning Robust and Privacy-Preserving Representations via Information Theory | arXiv | 2024 | Link |
| Leveraging A New GAN-based Transformer with ECDH Crypto-system for Enhancing Energy Theft Detection in Smart Grid | arXiv | 2024 | Link |
| Leveraging Model Guidance to Extract Training Data from Personalized Diffusion Models | arXiv | 2024 | Link |
| Leveraging Programmatically Generated Synthetic Data for Differentially Private Diffusion Training | arXiv | 2024 | Link |
| Long Story Short: Story-level Video Understanding from 20K Short Films | arXiv | 2024 | Link |
| Look into the Future: Deep Contextualized Sequential Recommendation | arXiv | 2024 | Link |
| Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection | arXiv | 2024 | Link |
| Lost in the Averages: A New Specific Setup to Evaluate Membership Inference Attacks Against Machine Learning Models | arXiv | 2024 | Link |
| MAPPING: Debiasing Graph Neural Networks for Fair Node Classification with Limited Sensitive Information Leakage | arXiv | 2024 | Link |
| MERA: A Comprehensive LLM Evaluation in Russian | arXiv | 2024 | Link |
| MGIC: A Multi-Label Gradient Inversion Attack based on Canny Edge Detection on Federated Learning | arXiv | 2024 | Link |
| MIBench: A Comprehensive Framework for Benchmarking Model Inversion Attack and Defense | arXiv | 2024 | Link |
| MLLM-LLaVA-FL: Multimodal Large Language Model Assisted Federated Learning | arXiv | 2024 | Link |
| MLLMGuard: A Multi-dimensional Safety Evaluation Suite for Multimodal Large Language Models | arXiv | 2024 | Link |
| MMLU-CF: A Contamination-free Multi-task Language Understanding Benchmark | arXiv | 2024 | Link |
| MT-Eval: A Multi-Turn Capabilities Evaluation Benchmark for Large Language Models | arXiv | 2024 | Link |
| MUSE: Machine Unlearning Six-Way Evaluation for Language Models | arXiv | 2024 | Link |
| Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning | arXiv | 2024 | Link |
| Mapping The Layers of The Ocean Floor With a Convolutional Neural Network | arXiv | 2024 | Link |
| Maximal Guesswork Leakage | arXiv | 2024 | Link |
| Measuring Quantum Information Leakage Under Detection Threat | arXiv | 2024 | Link |
| MedLeak: Multimodal Medical Data Leakage in Secure Federated Learning with Crafted Models | arXiv | 2024 | Link |
| Meeting Utility Constraints in Differential Privacy: A Privacy-Boosting Approach | arXiv | 2024 | Link |
| Membership Inference Attacks Against In-Context Learning | arXiv | 2024 | Link |
| Membership Inference on Text-to-Image Diffusion Models via Conditional Likelihood Discrepancy | arXiv | 2024 | Link |
| Membership Information Leakage in Federated Contrastive Learning | arXiv | 2024 | Link |
| Mitigating Prior Shape Bias in Point Clouds via Differentiable Center Learning | arXiv | 2024 | Link |
| Model Inversion Attacks Through Target-Specific Conditional Diffusion Models | arXiv | 2024 | Link |
| Model Inversion Attacks: A Survey of Approaches and Countermeasures | arXiv | 2024 | Link |
| Modular Neural Wiretap Codes for Fading Channels | arXiv | 2024 | Link |
| Multi-PA: A Multi-perspective Benchmark on Privacy Assessment for Large Vision-Language Models | arXiv | 2024 | Link |
| Multi-channel polarization manipulation based on graphene for encryption communication | arXiv | 2024 | Link |
| Multi-speaker Text-to-speech Training with Speaker Anonymized Data | arXiv | 2024 | Link |
| Mutual information chain rules for security proofs robust against device imperfections | arXiv | 2024 | Link |
| NR-V2X Quality of Service Prediction Through Machine Learning with Nested Cross-Validation Scheme | arXiv | 2024 | Link |
| NYT-Connections: A Deceptively Simple Text Classification Task that Stumps System-1 Thinkers | arXiv | 2024 | Link |
| Nebula: Efficient, Private and Accurate Histogram Estimation | arXiv | 2024 | Link |
| NetBench: A Large-Scale and Comprehensive Network Traffic Benchmark Dataset for Foundation Models | arXiv | 2024 | Link |
| NetDPSyn: Synthesizing Network Traces under Differential Privacy | arXiv | 2024 | Link |
| Network-Aware Value Stacking of Community Battery via Asynchronous Distributed Optimization | arXiv | 2024 | Link |
| Neural Embedded Mixed-Integer Optimization for Location-Routing Problems | arXiv | 2024 | Link |
| Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports | arXiv | 2024 | Link |
| No Free Lunch Theorem for Privacy-Preserving LLM Inference | arXiv | 2024 | Link |
| Noise Masking Attacks and Defenses for Pretrained Speech Models | arXiv | 2024 | Link |
| Obfuscation Based Privacy Preserving Representations are Recoverable Using Neighborhood Information | arXiv | 2024 | Link |
| OlympicArena: Benchmarking Multi-discipline Cognitive Reasoning for Superintelligent AI | arXiv | 2024 | Link |
| On Active Privacy Auditing in Supervised Fine-tuning for White-Box Language Models | arXiv | 2024 | Link |
| On Catastrophic Inheritance of Large Foundation Models | arXiv | 2024 | Link |
| On Class Separability Pitfalls In Audio-Text Contrastive Zero-Shot Learning | arXiv | 2024 | Link |
| On Epistemic Properties in Discrete-Event Systems: A Uniform Framework and Its Applications | arXiv | 2024 | Link |
| On Inter-dataset Code Duplication and Data Leakage in Large Language Models | arXiv | 2024 | Link |
| On Leakage of Code Generation Evaluation Datasets | arXiv | 2024 | Link |
| On Protecting the Data Privacy of Large Language Models (LLMs): A Survey | arXiv | 2024 | Link |
| On the (Mis)Use of Machine Learning with Panel Data | arXiv | 2024 | Link |
| On the Information Leakage Performance of Secure Finite Blocklength Transmissions over Rayleigh Fading Channels | arXiv | 2024 | Link |
| On the Vulnerability of Skip Connections to Model Inversion Attacks | arXiv | 2024 | Link |
| Open Ko-LLM Leaderboard: Evaluating Large Language Models in Korean with Ko-H5 Benchmark | arXiv | 2024 | Link |
| Optimal Defenses Against Gradient Reconstruction Attacks | arXiv | 2024 | Link |
| Optimal Privacy-Aware Stochastic Sampling | arXiv | 2024 | Link |
| Optimizing Age of Information in Vehicular Edge Computing with Federated Graph Neural Network Multi-Agent Reinforcement Learning | arXiv | 2024 | Link |
| Order Matters! An Empirical Study on Large Language Models' Input Order Bias in Software Fault Localization | arXiv | 2024 | Link |
| Orthogonal-state-based Measurement Device Independent Quantum Communication | arXiv | 2024 | Link |
| PANORAMIA: Privacy Auditing of Machine Learning Models without Retraining | arXiv | 2024 | Link |
| PAPILLON: Privacy Preservation from Internet-based and Local Language Model Ensembles | arXiv | 2024 | Link |
| PATE-TripleGAN: Privacy-Preserving Image Synthesis with Gaussian Differential Privacy | arXiv | 2024 | Link |
| PILA: Physics-Informed Low Rank Augmentation for Interpretable Earth Observation | arXiv | 2024 | Link |
| PRSI: Privacy-Preserving Recommendation Model Based on Vector Splitting and Interactive Protocols | arXiv | 2024 | Link |
| PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models | arXiv | 2024 | Link |
| PateGail: A Privacy-Preserving Mobility Trajectory Generator with Imitation Learning | arXiv | 2024 | Link |
| Peer2PIR: Private Queries for IPFS | arXiv | 2024 | Link |
| Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal Tools | arXiv | 2024 | Link |
| Perfect Gradient Inversion in Federated Learning: A New Paradigm from the Hidden Subset Sum Problem | arXiv | 2024 | Link |
| Perfect Subset Privacy in Polynomial Computation via Reed-Muller Information Super-sets | arXiv | 2024 | Link |
| PianoBART: Symbolic Piano Music Generation and Understanding with Large-Scale Pre-Training | arXiv | 2024 | Link |
| PixelFade: Privacy-preserving Person Re-identification with Noise-guided Progressive Replacement | arXiv | 2024 | Link |
| Position: Towards Implicit Prompt For Text-To-Image Models | arXiv | 2024 | Link |
| Pre-Training Protein Bi-level Representation Through Span Mask Strategy On 3D Protein Chains | arXiv | 2024 | Link |
| Prediction Exposes Your Face: Black-box Model Inversion via Prediction Alignment | arXiv | 2024 | Link |
| Preventing Non-intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters | arXiv | 2024 | Link |
| Preventive Audits for Data Applications Before Data Sharing in the Power IoT | arXiv | 2024 | Link |
| PriRoAgg: Achieving Robust Model Aggregation with Minimum Privacy Leakage for Federated Learning | arXiv | 2024 | Link |
| PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud | arXiv | 2024 | Link |
| Privacy Amplification for the Gaussian Mechanism via Bounded Support | arXiv | 2024 | Link |
| Privacy Attack in Federated Learning is Not Easy: An Experimental Study | arXiv | 2024 | Link |
| Privacy Aware Memory Forensics | arXiv | 2024 | Link |
| Privacy Challenges in Meta-Learning: An Investigation on Model-Agnostic Meta-Learning | arXiv | 2024 | Link |
| Privacy Leakage Overshadowed by Views of AI: A Study on Human Oversight of Privacy in Language Model Agent | arXiv | 2024 | Link |
| Privacy Leakage on DNNs: A Survey of Model Inversion Attacks and Defenses | arXiv | 2024 | Link |
| Privacy Preserving Semi-Decentralized Mean Estimation over Intermittently-Connected Networks | arXiv | 2024 | Link |
| Privacy in Federated Learning | arXiv | 2024 | Link |
| Privacy-Aware Design of Distributed MIMO ISAC Systems | arXiv | 2024 | Link |
| Privacy-Aware Multi-Device Cooperative Edge Inference with Distributed Resource Bidding | arXiv | 2024 | Link |
| Privacy-Preserving Collaborative Split Learning Framework for Smart Grid Load Forecasting | arXiv | 2024 | Link |
| Privacy-Preserving Federated Learning with Consistency via Knowledge Distillation Using Conditional Generator | arXiv | 2024 | Link |
| Privacy-Preserving Federated Learning with Differentially Private Hyperdimensional Computing | arXiv | 2024 | Link |
| Privacy-Preserving Federated Unlearning with Certified Client Removal | arXiv | 2024 | Link |
| Privacy-Preserving Heterogeneous Federated Learning for Sensitive Healthcare Data | arXiv | 2024 | Link |
| Privacy-Preserving Large Language Models: Mechanisms, Applications, and Future Directions | arXiv | 2024 | Link |
| Privacy-Preserving Low-Rank Adaptation against Membership Inference Attacks for Latent Diffusion Models | arXiv | 2024 | Link |
| Privacy-Preserving Student Learning with Differentially Private Data-Free Distillation | arXiv | 2024 | Link |
| Privacy-Preserving Video Anomaly Detection: A Survey | arXiv | 2024 | Link |
| Privacy-Utility Tradeoff Based on $α$-lift | arXiv | 2024 | Link |
| PrivacyLens: Evaluating Privacy Norm Awareness of Language Models in Action | arXiv | 2024 | Link |
| PrivatEyes: Appearance-based Gaze Estimation Using Federated Secure Multi-Party Computation | arXiv | 2024 | Link |
| Private Data Leakage in Federated Human Activity Recognition for Wearable Healthcare Devices | arXiv | 2024 | Link |
| Private Language Models via Truncated Laplacian Mechanism | arXiv | 2024 | Link |
| Private and Communication-Efficient Federated Learning based on Differentially Private Sketches | arXiv | 2024 | Link |
| Private, Augmentation-Robust and Task-Agnostic Data Valuation Approach for Data Marketplace | arXiv | 2024 | Link |
| Promise and Peril of Collaborative Code Generation Models: Balancing Effectiveness and Memorization | arXiv | 2024 | Link |
| Prompt-based Unifying Inference Attack on Graph Neural Networks | arXiv | 2024 | Link |
| Propelling Innovation to Defeat Data-Leakage Hardware Trojans: From Theory to Practice | arXiv | 2024 | Link |
| Protect Your Secrets: Understanding and Measuring Data Exposure in VSCode Extensions | arXiv | 2024 | Link |
| Protect and Extend -- Using GANs for Synthetic Data Generation of Time-Series Medical Records | arXiv | 2024 | Link |
| Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation | arXiv | 2024 | Link |
| Prototypical Distillation and Debiased Tuning for Black-box Unsupervised Domain Adaptation | arXiv | 2024 | Link |
| Provable Privacy Advantages of Decentralized Federated Learning via Distributed Optimization | arXiv | 2024 | Link |
| Providing Differential Privacy for Federated Learning Over Wireless: A Cross-layer Framework | arXiv | 2024 | Link |
| Psychometrics for Hypnopaedia-Aware Machinery via Chaotic Projection of Artificial Mental Imagery | arXiv | 2024 | Link |
| QI-DPFL: Quality-Aware and Incentive-Boosted Federated Learning with Differential Privacy | arXiv | 2024 | Link |
| QTFlow: Quantitative Timing-Sensitive Information Flow for Security-Aware Hardware Design on RTL | arXiv | 2024 | Link |
| QuanCrypt-FL: Quantized Homomorphic Encryption with Pruning for Secure Federated Learning | arXiv | 2024 | Link |
| Quantifying Privacy via Information Density | arXiv | 2024 | Link |
| Quantum Scheme for Private Set Intersection and Union Cardinality based on Quantum Homomorphic Encryption | arXiv | 2024 | Link |
| Quantum key distribution with imperfectly isolated devices | arXiv | 2024 | Link |
| Quantum-secure multiparty deep learning | arXiv | 2024 | Link |
| R-CONV: An Analytical Approach for Efficient Data Reconstruction via Convolutional Gradients | arXiv | 2024 | Link |
| RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM | arXiv | 2024 | Link |
| RFLPA: A Robust Federated Learning Framework against Poisoning Attacks with Secure Aggregation | arXiv | 2024 | Link |
| RSET: Remapping-based Sorting Method for Emotion Transfer Speech Synthesis | arXiv | 2024 | Link |
| RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations | arXiv | 2024 | Link |
| Random Erasing vs. Model Inversion: A Promising Defense or a False Hope? | arXiv | 2024 | Link |
| Rank Matters: Understanding and Defending Model Inversion Attacks via Low-Rank Feature Filtering | arXiv | 2024 | Link |
| Re-Evaluating Privacy in Centralized and Decentralized Learning: An Information-Theoretical and Empirical Study | arXiv | 2024 | Link |
| Real-Time Trajectory Synthesis with Local Differential Privacy | arXiv | 2024 | Link |
| Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT Models | arXiv | 2024 | Link |
| Reconstructing Training Data From Real World Models Trained with Transfer Learning | arXiv | 2024 | Link |
| Reconstruction of Differentially Private Text Sanitization via Large Language Models | arXiv | 2024 | Link |
| Recovering Labels from Local Updates in Federated Learning | arXiv | 2024 | Link |
| Red-Teaming Segment Anything Model | arXiv | 2024 | Link |
| Referee Can Play: An Alternative Approach to Conditional Generation via Model Inversion | arXiv | 2024 | Link |
| Reflection-Bench: Evaluating Epistemic Agency in Large Language Models | arXiv | 2024 | Link |
| Remote Estimation Games with Random Walk Processes: Stackelberg Equilibrium | arXiv | 2024 | Link |
| RemoteRAG: A Privacy-Preserving LLM Cloud RAG Service | arXiv | 2024 | Link |
| Representation Magnitude has a Liability to Privacy Vulnerability | arXiv | 2024 | Link |
| Retrieval-Augmented Generation Meets Data-Driven Tabula Rasa Approach for Temporal Knowledge Graph Forecasting | arXiv | 2024 | Link |
| Retrieval-Augmented Generation for AI-Generated Content: A Survey | arXiv | 2024 | Link |
| Revealing data leakage in protein interaction benchmarks | arXiv | 2024 | Link |
| Reverse Prompt Engineering | arXiv | 2024 | Link |
| Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks | arXiv | 2024 | Link |
| Revisiting Main Memory-Based Covert and Side Channel Attacks in the Context of Processing-in-Memory | arXiv | 2024 | Link |
| Revisiting Privacy-Utility Trade-off for DP Training with Pre-existing Knowledge | arXiv | 2024 | Link |
| Revisiting Unnaturalness for Automated Program Repair in the Era of Large Language Models | arXiv | 2024 | Link |
| Risks When Sharing LoRA Fine-Tuned Diffusion Model Weights | arXiv | 2024 | Link |
| RobustSVC: HuBERT-based Melody Extractor and Adversarial Learning for Robust Singing Voice Conversion | arXiv | 2024 | Link |
| Robustness of Practical Perceptual Hashing Algorithms to Hash-Evasion and Hash-Inversion Attacks | arXiv | 2024 | Link |
| SIDE: Surrogate Conditional Data Extraction from Diffusion Models | arXiv | 2024 | Link |
| SPEAR:Exact Gradient Inversion of Batches in Federated Learning | arXiv | 2024 | Link |
| SWE-Bench+: Enhanced Coding Benchmark for LLMs | arXiv | 2024 | Link |
| SecGenAI: Enhancing Security of Cloud-based Generative AI Applications within Australian Critical Technologies of National Interest | arXiv | 2024 | Link |
| Second-Order Information Matters: Revisiting Machine Unlearning for Large Language Models | arXiv | 2024 | Link |
| Secure Distributed Storage: Optimal Trade-Off Between Storage Rate and Privacy Leakage | arXiv | 2024 | Link |
| Secure Multiparty Generative AI | arXiv | 2024 | Link |
| Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing | arXiv | 2024 | Link |
| Secure Scattered Memory: Rethinking Secure Enclave Memory with Secret Sharing | arXiv | 2024 | Link |
| Secure Source Coding Resilient Against Compromised Users via an Access Structure | arXiv | 2024 | Link |
| Securing Biometric Data: Fully Homomorphic Encryption in Multimodal Iris and Face Recognition | arXiv | 2024 | Link |
| Security of practical modulator-free quantum key distribution | arXiv | 2024 | Link |
| SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries | arXiv | 2024 | Link |
| Seeing the Forest through the Trees: Data Leakage from Partial Transformer Gradients | arXiv | 2024 | Link |
| Segmented Private Data Aggregation in the Multi-message Shuffle Model | arXiv | 2024 | Link |
| Self-Control of LLM Behaviors by Compressing Suffix Gradient into Prefix Controller | arXiv | 2024 | Link |
| Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting | arXiv | 2024 | Link |
| Self-Supervised Pretext Tasks for Alzheimer's Disease Classification using 3D Convolutional Neural Networks on Large-Scale Synthetic Neuroimaging Dataset | arXiv | 2024 | Link |
| Semantic Alignment-Enhanced Code Translation via an LLM-Based Multi-Agent System | arXiv | 2024 | Link |
| Separating common from salient patterns with Contrastive Representation Learning | arXiv | 2024 | Link |
| Sequence-Level Leakage Risk of Training Data in Large Language Models | arXiv | 2024 | Link |
| Sequential Disentanglement by Extracting Static Information From A Single Sequence Element | arXiv | 2024 | Link |
| Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors | arXiv | 2024 | Link |
| Shifted Interpolation for Differential Privacy | arXiv | 2024 | Link |
| Silver Linings in the Shadows: Harnessing Membership Inference for Machine Unlearning | arXiv | 2024 | Link |
| Simulation-based Inference of Developmental EEG Maturation with the Spectral Graph Model | arXiv | 2024 | Link |
| Sketches-based join size estimation under local differential privacy | arXiv | 2024 | Link |
| Smooth Sensitivity for Learning Differentially-Private yet Accurate Rule Lists | arXiv | 2024 | Link |
| SoK: Membership Inference Attacks on LLMs are Rushing Nowhere (and How to Fix It) | arXiv | 2024 | Link |
| SoK: On Gradient Leakage in Federated Learning | arXiv | 2024 | Link |
| SoK: Reducing the Vulnerability of Fine-tuned Language Models to Membership Inference Attacks | arXiv | 2024 | Link |
| Source-level reasoning for quantitative information flow | arXiv | 2024 | Link |
| SpanSeq: Similarity-based sequence data splitting method for improved development and assessment of deep learning projects | arXiv | 2024 | Link |
| Special Characters Attack: Toward Scalable Training Data Extraction From Large Language Models | arXiv | 2024 | Link |
| Stable Inversion of Piecewise Affine Systems with Application to Feedforward and Iterative Learning Control | arXiv | 2024 | Link |
| State-of-the-Art Approaches to Enhancing Privacy Preservation of Machine Learning Datasets: A Survey | arXiv | 2024 | Link |
| Stealing Training Graphs from Graph Neural Networks | arXiv | 2024 | Link |
| Strategic Learning and Trading in Broker-Mediated Markets | arXiv | 2024 | Link |
| Structural Vulnerability in Y00 Protocols | arXiv | 2024 | Link |
| Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning | arXiv | 2024 | Link |
| SunBlock: Cloudless Protection for IoT Systems | arXiv | 2024 | Link |
| Supervised machine learning for microbiomics: bridging the gap between current and best practices | arXiv | 2024 | Link |
| TMGBench: A Systematic Game Benchmark for Evaluating Strategic Reasoning Abilities of LLMs | arXiv | 2024 | Link |
| TabVFL: Improving Latent Representation in Vertical Federated Learning | arXiv | 2024 | Link |
| TableGuard -- Securing Structured & Unstructured Data | arXiv | 2024 | Link |
| Temperature-Aware Phase-shift Design of LC-RIS for Secure Communication | arXiv | 2024 | Link |
| Test Oracle Automation in the era of LLMs | arXiv | 2024 | Link |
| Test smells in LLM-Generated Unit Tests | arXiv | 2024 | Link |
| Test-time generative augmentation for medical image segmentation | arXiv | 2024 | Link |
| Text Embedding Inversion Security for Multilingual Language Models | arXiv | 2024 | Link |
| The Asymptotic Behaviour of Information Leakage Metrics | arXiv | 2024 | Link |
| The Curse of Popularity: Popular Entities have Catastrophic Side Effects when Deleting Knowledge from Language Models | arXiv | 2024 | Link |
| The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems | arXiv | 2024 | Link |
| The Earth is Flat? Unveiling Factual Errors in Large Language Models | arXiv | 2024 | Link |
| The Effect of Quantization in Federated Learning: A Rényi Differential Privacy Perspective | arXiv | 2024 | Link |
| The Effects of Data Imbalance Under a Federated Learning Approach for Credit Risk Forecasting | arXiv | 2024 | Link |
| The Fire Thief Is Also the Keeper: Balancing Usability and Privacy in Prompts | arXiv | 2024 | Link |
| The Impact of Speech Anonymization on Pathology and Its Limits | arXiv | 2024 | Link |
| The Impact of Train-Test Leakage on Machine Learning-based Android Malware Detection | arXiv | 2024 | Link |
| The Last Iterate Advantage: Empirical Auditing and Principled Heuristic Analysis of Differentially Private SGD | arXiv | 2024 | Link |
| The Limits of Differential Privacy in Online Learning | arXiv | 2024 | Link |
| The Medium is the Message: How Secure Messaging Apps Leak Sensitive Data to Push Notification Services | arXiv | 2024 | Link |
| The Mirrored Influence Hypothesis: Efficient Data Influence Estimation by Harnessing Forward Passes | arXiv | 2024 | Link |
| The Phantom Menace: Unmasking Privacy Leakages in Vision-Language Models | arXiv | 2024 | Link |
| The Queen of England is not England's Queen: On the Lack of Factual Coherency in PLMs | arXiv | 2024 | Link |
| The Unlikely Duel: Evaluating Creative Writing in LLMs through a Unique Scenario | arXiv | 2024 | Link |
| The impact of Facebook-Cambridge Analytica data scandal on the USA tech stock market: An event study based on clustering method | arXiv | 2024 | Link |
| Theoretical Analysis of Privacy Leakage in Trustworthy Federated Learning: A Perspective from Linear Algebra and Optimization Theory | arXiv | 2024 | Link |
| Threats, Attacks, and Defenses in Machine Unlearning: A Survey | arXiv | 2024 | Link |
| Tiny models from tiny data: Textual and null-text inversion for few-shot distillation | arXiv | 2024 | Link |
| TinyML Security: Exploring Vulnerabilities in Resource-Constrained Machine Learning Systems | arXiv | 2024 | Link |
| To Shuffle or not to Shuffle: Auditing DP-SGD with Shuffling | arXiv | 2024 | Link |
| ToMBench: Benchmarking Theory of Mind in Large Language Models | arXiv | 2024 | Link |
| Top Leaderboard Ranking = Top Coding Proficiency, Always? EvoEval: Evolving Coding Benchmarks via LLM | arXiv | 2024 | Link |
| Towards Eliminating Hard Label Constraints in Gradient Inversion Attacks | arXiv | 2024 | Link |
| Towards Scalable and Robust Model Versioning | arXiv | 2024 | Link |
| Towards identifying Source credibility on Information Leakage in Digital Gadget Market | arXiv | 2024 | Link |
| Towards the Uncharted: Density-Descending Feature Perturbation for Semi-supervised Semantic Segmentation | arXiv | 2024 | Link |
| Tracing Privacy Leakage of Language Models to Training Data via Adjusted Influence Functions | arXiv | 2024 | Link |
| Training on Fake Labels: Mitigating Label Leakage in Split Learning via Secure Dimension Transformation | arXiv | 2024 | Link |
| Training on the Benchmark Is Not All You Need | arXiv | 2024 | Link |
| Training on the Test Task Confounds Evaluation and Emergence | arXiv | 2024 | Link |
| Training-efficient density quantum machine learning | arXiv | 2024 | Link |
| Trap-MID: Trapdoor-based Defense against Model Inversion Attacks | arXiv | 2024 | Link |
| Tree-Based Leakage Inspection and Control in Concept Bottleneck Models | arXiv | 2024 | Link |
| TreeEval: Benchmark-Free Evaluation of Large Language Models through Tree Planning | arXiv | 2024 | Link |
| Trust and ethical considerations in a multi-modal, explainable AI-driven chatbot tutoring system: The case of collaboratively solving Rubik's Cube | arXiv | 2024 | Link |
| TrustAI at SemEval-2024 Task 8: A Comprehensive Analysis of Multi-domain Machine Generated Text Detection Techniques | arXiv | 2024 | Link |
| Trustworthiness of Stochastic Gradient Descent in Distributed Learning | arXiv | 2024 | Link |
| Two-Way Aerial Secure Communications via Distributed Collaborative Beamforming under Eavesdropper Collusion | arXiv | 2024 | Link |
| UA-PDFL: A Personalized Approach for Decentralized Federated Learning | arXiv | 2024 | Link |
| UIFV: Data Reconstruction Attack in Vertical Federated Learning | arXiv | 2024 | Link |
| UnSeenTimeQA: Time-Sensitive Question-Answering Beyond LLMs' Memorization | arXiv | 2024 | Link |
| Uncovering Latent Memories: Assessing Data Leakage and Memorization Patterns in Frontier AI Models | arXiv | 2024 | Link |
| Understanding Side-Channel Vulnerabilities in Superconducting Qubit Readout Architectures | arXiv | 2024 | Link |
| Unlocking Visual Secrets: Inverting Features with Diffusion Priors for Image Reconstruction | arXiv | 2024 | Link |
| Unprotected 4G/5G Control Procedures at Low Layers Considered Dangerous | arXiv | 2024 | Link |
| Unveiling Privacy Vulnerabilities: Investigating the Role of Structure in Graph Data | arXiv | 2024 | Link |
| Using Synthetic Data to Mitigate Unfairness and Preserve Privacy in Collaborative Machine Learning | arXiv | 2024 | Link |
| Utilizing Large LanguageModels to Detect Privacy Leaks in Mini-App Code | arXiv | 2024 | Link |
| VFLGAN: Vertical Federated Learning-based Generative Adversarial Network for Vertically Partitioned Data Publication | arXiv | 2024 | Link |
| VLG-CBM: Training Concept Bottleneck Models with Vision-Language Guidance | arXiv | 2024 | Link |
| VLSBench: Unveiling Visual Leakage in Multimodal Safety | arXiv | 2024 | Link |
| VarBench: Robust Language Model Benchmarking Through Dynamic Variable Perturbation | arXiv | 2024 | Link |
| VerifiableFL: Verifiable Claims for Federated Learning using Exclaves | arXiv | 2024 | Link |
| Visual Privacy Auditing with Diffusion Models | arXiv | 2024 | Link |
| Vulnerability Detection with Code Language Models: How Far Are We? | arXiv | 2024 | Link |
| Wasserstein Differential Privacy | arXiv | 2024 | Link |
| Weakly Private Information Retrieval from Heterogeneously Trusted Servers | arXiv | 2024 | Link |
| Weakly-Private Information Retrieval From MDS-Coded Distributed Storage | arXiv | 2024 | Link |
| What do we learn from inverting CLIP models? | arXiv | 2024 | Link |
| Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs | arXiv | 2024 | Link |
| WildlifeReID-10k: Wildlife re-identification dataset with 10k individual animals | arXiv | 2024 | Link |
| fence.t.s: Closing Timing Channels in High-Performance Out-of-Order Cores through ISA-Supported Temporal Partitioning | arXiv | 2024 | Link |
| modeLing: A Novel Dataset for Testing Linguistic Reasoning in Language Models | arXiv | 2024 | Link |
| tsdataleaks: An R Package to Detect Potential Data Leaks in Forecasting Competitions | arXiv | 2024 | Link |
| zkLLM: Zero Knowledge Proofs for Large Language Models | arXiv | 2024 | Link |
2023
| Title | Venue | Year | Link |
|---|---|---|---|
| "Can't Take the Pressure?": Examining the Challenges of Blood Pressure Estimation via Pulse Wave Analysis | arXiv | 2023 | Link |
| A Compact LSTM-SVM Fusion Model for Long-Duration Cardiovascular Diseases Detection | arXiv | 2023 | Link |
| A Comprehensive Study of Privacy Risks in Curriculum Learning | arXiv | 2023 | Link |
| A Comprehensive Survey of Forgetting in Deep Learning Beyond Continual Learning | arXiv | 2023 | Link |
| A Critical Review of Large Language Model on Software Engineering: An Example from ChatGPT and Automated Program Repair | arXiv | 2023 | Link |
| A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks | arXiv | 2023 | Link |
| A Few-Shot Approach to Dysarthric Speech Intelligibility Level Classification Using Transformers | arXiv | 2023 | Link |
| A Floating-Point Secure Implementation of the Report Noisy Max with Gap Mechanism | arXiv | 2023 | Link |
| A Forecasting-Based DLP Approach for Data Security | arXiv | 2023 | Link |
| A Game-theoretic Framework for Privacy-preserving Federated Learning | arXiv | 2023 | Link |
| A Generalized Look at Federated Learning: Survey and Perspectives | arXiv | 2023 | Link |
| A Learning oriented DLP System based on Classification Model | arXiv | 2023 | Link |
| A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data | arXiv | 2023 | Link |
| A Meta-learning Framework for Tuning Parameters of Protection Mechanisms in Trustworthy Federated Learning | arXiv | 2023 | Link |
| A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning | arXiv | 2023 | Link |
| A Novel Approach for Machine Learning-based Load Balancing in High-speed Train System using Nested Cross Validation | arXiv | 2023 | Link |
| A Novel Method Combines Moving Fronts, Data Decomposition and Deep Learning to Forecast Intricate Time Series | arXiv | 2023 | Link |
| A Randomized Approach for Tight Privacy Accounting | arXiv | 2023 | Link |
| A Split-and-Privatize Framework for Large Language Model Fine-Tuning | arXiv | 2023 | Link |
| A Survey of Access Control Misconfiguration Detection Techniques | arXiv | 2023 | Link |
| A Survey of What to Share in Federated Learning: Perspectives on Model Utility, Privacy Leakage, and Communication Efficiency | arXiv | 2023 | Link |
| A Survey on Blockchain-Based Federated Learning and Data Privacy | arXiv | 2023 | Link |
| A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems | arXiv | 2023 | Link |
| A Theoretical Insight into Attack and Defense of Gradient Leakage in Transformer | arXiv | 2023 | Link |
| A critical look at the evaluation of GNNs under heterophily: Are we really making progress? | arXiv | 2023 | Link |
| AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks against Interpretable Models | arXiv | 2023 | Link |
| Accelerating Secure and Verifiable Data Deletion in Cloud Storage via SGX and Blockchain | arXiv | 2023 | Link |
| Accurate, Explainable, and Private Models: Providing Recourse While Minimizing Training Data Leakage | arXiv | 2023 | Link |
| Adaptive Domain Inference Attack with Concept Hierarchy | arXiv | 2023 | Link |
| Adaptive Local Adversarial Attacks on 3D Point Clouds for Augmented Reality | arXiv | 2023 | Link |
| Adaptive Privacy-Preserving Coded Computing With Hierarchical Task Partitioning | arXiv | 2023 | Link |
| Adversarial Predictions of Data Distributions Across Federated Internet-of-Things Devices | arXiv | 2023 | Link |
| An Achievable and Analytic Solution to Information Bottleneck for Gaussian Mixtures | arXiv | 2023 | Link |
| An Improved Christofides Mechanism for Local Differential Privacy Framework | arXiv | 2023 | Link |
| AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning | arXiv | 2023 | Link |
| AnonPSI: An Anonymity Assessment Framework for PSI | arXiv | 2023 | Link |
| Applying Plain Transformers to Real-World Point Clouds | arXiv | 2023 | Link |
| Approximate reconstructability of quantum states and noisy quantum secret sharing schemes | arXiv | 2023 | Link |
| Attend Who is Weak: Enhancing Graph Condensation via Cross-Free Adversarial Training | arXiv | 2023 | Link |
| Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing | arXiv | 2023 | Link |
| BLIAM: Literature-based Data Synthesis for Synergistic Drug Combination Prediction | arXiv | 2023 | Link |
| BPKD: Boundary Privileged Knowledge Distillation For Semantic Segmentation | arXiv | 2023 | Link |
| BRNES: Enabling Security and Privacy-aware Experience Sharing in Multiagent Robotic and Autonomous Systems | arXiv | 2023 | Link |
| Bag of Tricks for Training Data Extraction from Language Models | arXiv | 2023 | Link |
| Balancing Privacy Protection and Interpretability in Federated Learning | arXiv | 2023 | Link |
| Bayesian sparsification for deep neural networks with Bayesian model reduction | arXiv | 2023 | Link |
| Be Careful What You Smooth For: Label Smoothing Can Be a Privacy Shield but Also a Catalyst for Model Inversion Attacks | arXiv | 2023 | Link |
| BeamSec: A Practical mmWave Physical Layer Security Scheme Against Strong Adversaries | arXiv | 2023 | Link |
| Benchmarking Pretrained Vision Embeddings for Near- and Duplicate Detection in Medical Images | arXiv | 2023 | Link |
| Benchmarking and Enhancing Disentanglement in Concept-Residual Models | arXiv | 2023 | Link |
| Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems | arXiv | 2023 | Link |
| Beyond Gradient and Priors in Privacy Attacks: Leveraging Pooler Layer Inputs of Language Models in Federated Learning | arXiv | 2023 | Link |
| Black-box Membership Inference Attacks against Fine-tuned Diffusion Models | arXiv | 2023 | Link |
| Blockchain-empowered Federated Learning for Healthcare Metaverses: User-centric Incentive Mechanism with Optimal Data Freshness | arXiv | 2023 | Link |
| Blockchain-enabled Data Governance for Privacy-Preserved Sharing of Confidential Data | arXiv | 2023 | Link |
| Boosting Model Inversion Attacks with Adversarial Examples | arXiv | 2023 | Link |
| Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack | arXiv | 2023 | Link |
| Breaking the Silence: the Threats of Using LLMs in Software Engineering | arXiv | 2023 | Link |
| ByzSecAgg: A Byzantine-Resistant Secure Aggregation Scheme for Federated Learning Based on Coded Computing and Vector Commitment | arXiv | 2023 | Link |
| CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation | arXiv | 2023 | Link |
| CSI-Based Efficient Self-Quarantine Monitoring System Using Branchy Convolution Neural Network | arXiv | 2023 | Link |
| CSMeD: Bridging the Dataset Gap in Automated Citation Screening for Systematic Literature Reviews | arXiv | 2023 | Link |
| Cal-SFDA: Source-Free Domain-adaptive Semantic Segmentation with Differentiable Expected Calibration Error | arXiv | 2023 | Link |
| Can LLMs Effectively Leverage Graph Structural Information through Prompts, and Why? | arXiv | 2023 | Link |
| Can Membership Inferencing be Refuted? | arXiv | 2023 | Link |
| Causality-Inspired Fair Representation Learning for Multimodal Recommendation | arXiv | 2023 | Link |
| Certified randomness in tight space | arXiv | 2023 | Link |
| Checking and Automating Confidentiality Theory in Isabelle/UTP | arXiv | 2023 | Link |
| Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities | arXiv | 2023 | Link |
| Citadel: Simple Spectre-Safe Isolation For Real-World Programs That Share Memory | arXiv | 2023 | Link |
| Class Attribute Inference Attacks: Inferring Sensitive Class Information by Diffusion-Based Attribute Manipulations | arXiv | 2023 | Link |
| Client-side Gradient Inversion Against Federated Learning from Poisoning | arXiv | 2023 | Link |
| CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models | arXiv | 2023 | Link |
| Collaborative Mean Estimation over Intermittently Connected Networks with Peer-To-Peer Privacy | arXiv | 2023 | Link |
| Color Prompting for Data-Free Continual Unsupervised Domain Adaptive Person Re-Identification | arXiv | 2023 | Link |
| Communication Efficient and Privacy-Preserving Federated Learning Based on Evolution Strategies | arXiv | 2023 | Link |
| ConDefects: A New Dataset to Address the Data Leakage Concern for LLM-based Fault Localization and Program Repair | arXiv | 2023 | Link |
| Condensed Prototype Replay for Class Incremental Learning | arXiv | 2023 | Link |
| Configuring Timing Parameters to Ensure Execution-Time Opacity in Timed Automata | arXiv | 2023 | Link |
| Considerations on the Theory of Training Models with Differential Privacy | arXiv | 2023 | Link |
| Context-Aware Differential Privacy for Language Modeling | arXiv | 2023 | Link |
| Controllable Inversion of Black-Box Face Recognition Models via Diffusion | arXiv | 2023 | Link |
| Convergence Visualizer of Decentralized Federated Distillation with Reduced Communication Costs | arXiv | 2023 | Link |
| Cosmology from LOFAR Two-metre Sky Survey Data Release 2: Angular Clustering of Radio Sources | arXiv | 2023 | Link |
| CovarNav: Machine Unlearning via Model Inversion and Covariance Navigation | arXiv | 2023 | Link |
| Cross Device Federated Intrusion Detector for Early Stage Botnet Propagation in IoT | arXiv | 2023 | Link |
| Crossing Roads of Federated Learning and Smart Grids: Overview, Challenges, and Perspectives | arXiv | 2023 | Link |
| DDMT: Denoising Diffusion Mask Transformer Models for Multivariate Time Series Anomaly Detection | arXiv | 2023 | Link |
| DEPN: Detecting and Editing Privacy Neurons in Pretrained Language Models | arXiv | 2023 | Link |
| DPGOMI: Differentially Private Data Publishing with Gaussian Optimized Model Inversion | arXiv | 2023 | Link |
| DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming | arXiv | 2023 | Link |
| DPMLBench: Holistic Evaluation of Differentially Private Machine Learning | arXiv | 2023 | Link |
| DPSUR: Accelerating Differentially Private Stochastic Gradient Descent Using Selective Update and Release | arXiv | 2023 | Link |
| Data Encoding For Healthcare Data Democratisation and Information Leakage Prevention | arXiv | 2023 | Link |
| Data leakage in cross-modal retrieval training: A case study | arXiv | 2023 | Link |
| Data-Free Distillation Improves Efficiency and Privacy in Federated Thorax Disease Analysis | arXiv | 2023 | Link |
| Decentralized Graph Neural Network for Privacy-Preserving Recommendation | arXiv | 2023 | Link |
| Deep Reinforcement Learning for Privacy-Preserving Task Offloading in Integrated Satellite-Terrestrial Networks | arXiv | 2023 | Link |
| Defending Label Inference Attacks in Split Learning under Regression Setting | arXiv | 2023 | Link |
| Differential Privacy with Higher Utility by Exploiting Coordinate-wise Disparity: Laplace Mechanism Can Beat Gaussian in High Dimensions | arXiv | 2023 | Link |
| Differentially Private Decoupled Graph Convolutions for Multigranular Topology Protection | arXiv | 2023 | Link |
| Differentially Private Over-the-Air Federated Learning Over MIMO Fading Channels | arXiv | 2023 | Link |
| Differentially Private Secure Multiplication: Hiding Information in the Rubble of Noise | arXiv | 2023 | Link |
| Differentially Private Streaming Data Release under Temporal Correlations via Post-processing | arXiv | 2023 | Link |
| Digital Privacy Under Attack: Challenges and Enablers | arXiv | 2023 | Link |
| Disentangled Information Bottleneck guided Privacy-Protective JSCC for Image Transmission | arXiv | 2023 | Link |
| Distributed Optimization with Feasible Set Privacy | arXiv | 2023 | Link |
| Do Backdoors Assist Membership Inference Attacks? | arXiv | 2023 | Link |
| Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App | arXiv | 2023 | Link |
| Does Prompt-Tuning Language Model Ensure Privacy? | arXiv | 2023 | Link |
| Don't Memorize; Mimic The Past: Federated Class Incremental Learning Without Episodic Memory | arXiv | 2023 | Link |
| Dynamic Private Task Assignment under Differential Privacy | arXiv | 2023 | Link |
| EZClone: Improving DNN Model Extraction Attack via Shape Distillation from GPU Execution Profiles | arXiv | 2023 | Link |
| Edge-assisted U-Shaped Split Federated Learning with Privacy-preserving for Internet of Things | arXiv | 2023 | Link |
| Efficient Deduplication and Leakage Detection in Large Scale Image Datasets with a focus on the CrowdAI Mapping Challenge Dataset | arXiv | 2023 | Link |
| Efficient Network Representation for GNN-based Intrusion Detection | arXiv | 2023 | Link |
| Efficient Vertical Federated Learning with Secure Aggregation | arXiv | 2023 | Link |
| Efficient and Secure Federated Learning for Financial Applications | arXiv | 2023 | Link |
| Efficiently Predicting Protein Stability Changes Upon Single-point Mutation with Large Language Models | arXiv | 2023 | Link |
| Enabling Competitive Performance of Medical Imaging with Diffusion Model-generated Images without Privacy Leakage | arXiv | 2023 | Link |
| Enhanced EEG-Based Mental State Classification : A novel approach to eliminate data leakage and improve training optimization for Machine Learning | arXiv | 2023 | Link |
| Enhancing Accuracy-Privacy Trade-off in Differentially Private Split Learning | arXiv | 2023 | Link |
| Enhancing Mobile Privacy and Security: A Face Skin Patch-Based Anti-Spoofing Approach | arXiv | 2023 | Link |
| Estimating irregular water demands with physics-informed machine learning to inform leakage detection | arXiv | 2023 | Link |
| Ethicist: Targeted Training Data Extraction Through Loss Smoothed Soft Prompting and Calibrated Confidence Estimation | arXiv | 2023 | Link |
| Evaluating Online Bandit Exploration In Large-Scale Recommender System | arXiv | 2023 | Link |
| Evaluating Privacy Leakage in Split Learning | arXiv | 2023 | Link |
| Exploit the Leak: Understanding Risks in Biometric Matchers | arXiv | 2023 | Link |
| Exploratory Analysis of Federated Learning Methods with Differential Privacy on MIMIC-III | arXiv | 2023 | Link |
| Explore In-Context Learning for 3D Point Cloud Understanding | arXiv | 2023 | Link |
| Expressive variational quantum circuits provide inherent privacy in federated learning | arXiv | 2023 | Link |
| Extending and Defending Attacks on Reset Operations in Quantum Computers | arXiv | 2023 | Link |
| FCB-SwinV2 Transformer for Polyp Segmentation | arXiv | 2023 | Link |
| FLAG: Fast Label-Adaptive Aggregation for Multi-label Classification in Federated Learning | arXiv | 2023 | Link |
| FLShield: A Validation Based Federated Learning Framework to Defend Against Poisoning Attacks | arXiv | 2023 | Link |
| Face Encryption via Frequency-Restricted Identity-Agnostic Attacks | arXiv | 2023 | Link |
| Facial Data Minimization: Shallow Model as Your Privacy Filter | arXiv | 2023 | Link |
| Fairness and Privacy-Preserving in Federated Learning: A Survey | arXiv | 2023 | Link |
| Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks | arXiv | 2023 | Link |
| Feature-Rich Audio Model Inversion for Data-Free Knowledge Distillation Towards General Sound Classification | arXiv | 2023 | Link |
| FedAgg: Adaptive Federated Learning with Aggregated Gradients | arXiv | 2023 | Link |
| FedBIAD: Communication-Efficient and Accuracy-Guaranteed Federated Learning with Bayesian Inference-Based Adaptive Dropout | arXiv | 2023 | Link |
| FedConv: Enhancing Convolutional Neural Networks for Handling Data Heterogeneity in Federated Learning | arXiv | 2023 | Link |
| FedDBL: Communication and Data Efficient Federated Deep-Broad Learning for Histopathological Tissue Classification | arXiv | 2023 | Link |
| FedML-HE: An Efficient Homomorphic-Encryption-Based Privacy-Preserving Federated Learning System | arXiv | 2023 | Link |
| FedPDD: A Privacy-preserving Double Distillation Framework for Cross-silo Federated Recommendation | arXiv | 2023 | Link |
| FedVS: Straggler-Resilient and Privacy-Preserving Vertical Federated Learning for Split Models | arXiv | 2023 | Link |
| Federated Classification in Hyperbolic Spaces via Secure Aggregation of Convex Hulls | arXiv | 2023 | Link |
| Federated Knowledge Graph Completion via Latent Embedding Sharing and Tensor Factorization | arXiv | 2023 | Link |
| Federated Learning for Metaverse: A Survey | arXiv | 2023 | Link |
| Federated Learning via Input-Output Collaborative Distillation | arXiv | 2023 | Link |
| Federated Learning with Reduced Information Leakage and Computation | arXiv | 2023 | Link |
| Federated Learning-based Vehicle Trajectory Prediction against Cyberattacks | arXiv | 2023 | Link |
| Federated Quantum Machine Learning with Differential Privacy | arXiv | 2023 | Link |
| FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users | arXiv | 2023 | Link |
| Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation | arXiv | 2023 | Link |
| Finding Vulnerabilities in Mobile Application APIs: A Modular Programmatic Approach | arXiv | 2023 | Link |
| FlowFormer++: Masked Cost Volume Autoencoding for Pretraining Optical Flow Estimation | arXiv | 2023 | Link |
| Foreseeing Reconstruction Quality of Gradient Inversion: An Optimization Perspective | arXiv | 2023 | Link |
| GAM : Gradient Attention Module of Optimization for Point Clouds Analysis | arXiv | 2023 | Link |
| GAN-based Vertical Federated Learning for Label Protection in Binary Classification | arXiv | 2023 | Link |
| GIFD: A Generative Gradient Inversion Method with Feature Domain Optimization | arXiv | 2023 | Link |
| GPT Can Solve Mathematical Problems Without a Calculator | arXiv | 2023 | Link |
| Gaussian process regression and conditional Karhunen-Loéve models for data assimilation in inverse problems | arXiv | 2023 | Link |
| Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models | arXiv | 2023 | Link |
| GeoLocator: a location-integrated large multimodal model for inferring geo-privacy | arXiv | 2023 | Link |
| Gotcha! This Model Uses My Code! Evaluating Membership Leakage Risks in Code Models | arXiv | 2023 | Link |
| Gradient-Free Privacy Leakage in Federated Language Models through Selective Weight Tampering | arXiv | 2023 | Link |
| GraphMoco:a Graph Momentum Contrast Model that Using Multimodel Structure Information for Large-scale Binary Function Representation Learning | arXiv | 2023 | Link |
| Harnessing Inherent Noises for Privacy Preservation in Quantum Machine Learning | arXiv | 2023 | Link |
| High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption | arXiv | 2023 | Link |
| Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs | arXiv | 2023 | Link |
| How You Split Matters: Data Leakage and Subject Characteristics Studies in Longitudinal Brain MRI Analysis | arXiv | 2023 | Link |
| HuRef: HUman-REadable Fingerprint for Large Language Models | arXiv | 2023 | Link |
| Huff-DP: Huffman Coding based Differential Privacy Mechanism for Real-Time Data | arXiv | 2023 | Link |
| Hyperfuzzing: black-box security hypertesting with a grey-box fuzzer | arXiv | 2023 | Link |
| Image Captions are Natural Prompts for Text-to-Image Models | arXiv | 2023 | Link |
| Impedance Leakage Vulnerability and its Utilization in Reverse-engineering Embedded Software | arXiv | 2023 | Link |
| Improving Input-label Mapping with Demonstration Replay for In-context Learning | arXiv | 2023 | Link |
| Improving the Model Consistency of Decentralized Federated Learning | arXiv | 2023 | Link |
| InVAErt networks: a data-driven framework for model synthesis and identifiability analysis | arXiv | 2023 | Link |
| InferDPT: Privacy-Preserving Inference for Black-box Large Language Model | arXiv | 2023 | Link |
| Information Leakage from Data Updates in Machine Learning Models | arXiv | 2023 | Link |
| Information Leakage from Optical Emanations | arXiv | 2023 | Link |
| Information-Theoretic Privacy-Preserving Schemes Based On Perfect Privacy | arXiv | 2023 | Link |
| Initialization Matters: Privacy-Utility Analysis of Overparameterized Neural Networks | arXiv | 2023 | Link |
| InstructTTS: Modelling Expressive TTS in Discrete Latent Space with Natural Language Style Prompt | arXiv | 2023 | Link |
| Integrated Sensing, Navigation, and Communication for Secure UAV Networks with a Mobile Eavesdropper | arXiv | 2023 | Link |
| Integration of Digital Twin and Federated Learning for Securing Vehicular Internet of Things | arXiv | 2023 | Link |
| Introducing Model Inversion Attacks on Automatic Speaker Recognition | arXiv | 2023 | Link |
| Inverse classification with logistic and softmax classifiers: efficient optimization | arXiv | 2023 | Link |
| Is ChatGPT the Ultimate Programming Assistant -- How far is it? | arXiv | 2023 | Link |
| KBody: Towards general, robust, and aligned monocular whole-body estimation | arXiv | 2023 | Link |
| LDP-Feat: Image Features with Local Differential Privacy | arXiv | 2023 | Link |
| LEAT: Towards Robust Deepfake Disruption in Real-World Scenarios via Latent Ensemble Attack | arXiv | 2023 | Link |
| Label-Only Model Inversion Attacks via Knowledge Transfer | arXiv | 2023 | Link |
| Language Model Inversion | arXiv | 2023 | Link |
| Leak Proof PDBBind: A Reorganized Dataset of Protein-Ligand Complexes for More Generalizable Binding Affinity Prediction | arXiv | 2023 | Link |
| Leave-one-out Distinguishability in Machine Learning | arXiv | 2023 | Link |
| Leveraging Speaker Embeddings with Adversarial Multi-task Learning for Age Group Classification | arXiv | 2023 | Link |
| Localization Is All You Evaluate: Data Leakage in Online Mapping Datasets and How to Fix It | arXiv | 2023 | Link |
| LooGLE: Can Long-Context Language Models Understand Long Contexts? | arXiv | 2023 | Link |
| Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption | arXiv | 2023 | Link |
| Low-Complexity Dynamic Directional Modulation: Vulnerability and Information Leakage | arXiv | 2023 | Link |
| M3AE: Multimodal Representation Learning for Brain Tumor Segmentation with Missing Modalities | arXiv | 2023 | Link |
| M3FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System | arXiv | 2023 | Link |
| MGMAE: Motion Guided Masking for Video Masked Autoencoding | arXiv | 2023 | Link |
| MME: A Comprehensive Evaluation Benchmark for Multimodal Large Language Models | arXiv | 2023 | Link |
| Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction | arXiv | 2023 | Link |
| Make Landscape Flatter in Differentially Private Federated Learning | arXiv | 2023 | Link |
| Making Translators Privacy-aware on the User's Side | arXiv | 2023 | Link |
| Managed Geo-Distributed Feature Store: Architecture and System Design | arXiv | 2023 | Link |
| Masked Trajectory Models for Prediction, Representation, and Control | arXiv | 2023 | Link |
| Massive Thirring Model: Inverse Scattering and Soliton Resolution | arXiv | 2023 | Link |
| Maximal Information Leakage from Quantum Encoding of Classical Data | arXiv | 2023 | Link |
| McFIL: Model Counting Functionality-Inherent Leakage | arXiv | 2023 | Link |
| Measuring the Privacy Leakage via Graph Reconstruction Attacks on Simplicial Neural Networks (Student Abstract) | arXiv | 2023 | Link |
| Medical Question Summarization with Entity-driven Contrastive Learning | arXiv | 2023 | Link |
| Mitigating Adversarial Attacks in Federated Learning with Trusted Execution Environments | arXiv | 2023 | Link |
| Mitigating Cross-client GANs-based Attack in Federated Learning | arXiv | 2023 | Link |
| Mitigating the Risk of Knowledge Leakage in Knowledge Intensive Organizations: a Mobile Device Perspective | arXiv | 2023 | Link |
| Mitigating the source-side channel vulnerability by characterization of photon statistics | arXiv | 2023 | Link |
| Model Conversion via Differentially Private Data-Free Distillation | arXiv | 2023 | Link |
| Model Inversion Attack via Dynamic Memory Learning | arXiv | 2023 | Link |
| Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks | arXiv | 2023 | Link |
| Modeling Inverse Demand Function with Explainable Dual Neural Networks | arXiv | 2023 | Link |
| Multimodal machine learning for 3-dimensional characterization of hidden groundwater and geothermal resources | arXiv | 2023 | Link |
| NIPD: A Federated Learning Person Detection Benchmark Based on Real-World Non-IID Data | arXiv | 2023 | Link |
| NaturalInversion: Data-Free Image Synthesis Improving Real-World Consistency | arXiv | 2023 | Link |
| Neural Network Analytic Continuation for Monte Carlo: Improvement by Statistical Errors | arXiv | 2023 | Link |
| Non-Adaptive Coding for Two-Way Wiretap Channel with or without Cost Constraints | arXiv | 2023 | Link |
| Noninterference Analysis of Reversible Systems: An Approach Based on Branching Bisimilarity | arXiv | 2023 | Link |
| OASIS: Offsetting Active Reconstruction Attacks in Federated Learning | arXiv | 2023 | Link |
| Objective Evaluation-based High-efficiency Learning Framework for Hyperspectral Image Classification | arXiv | 2023 | Link |
| ObliuSky: Oblivious User-Defined Skyline Query Processing in the Cloud | arXiv | 2023 | Link |
| On the Fine-Grained Hardness of Inverting Generative Models | arXiv | 2023 | Link |
| On the Inherent Privacy Properties of Discrete Denoising Diffusion Models | arXiv | 2023 | Link |
| On the Relationship Between Information-Theoretic Privacy Metrics And Probabilistic Information Privacy | arXiv | 2023 | Link |
| On the Universal Adversarial Perturbations for Efficient Data-free Adversarial Detection | arXiv | 2023 | Link |
| On the physical layer security capabilities of reconfigurable intelligent surface empowered wireless systems | arXiv | 2023 | Link |
| One-Time Universal Hashing Quantum Digital Signatures without Perfect Keys | arXiv | 2023 | Link |
| Online Spatio-Temporal Correlation-Based Federated Learning for Traffic Flow Forecasting | arXiv | 2023 | Link |
| Online search is more likely to lead students to validate true news than to refute false ones | arXiv | 2023 | Link |
| Optimizing Privacy, Utility and Efficiency in Constrained Multi-Objective Federated Learning | arXiv | 2023 | Link |
| Outer Bounds on the CEO Problem with Privacy Constraints | arXiv | 2023 | Link |
| Over-the-Air Federated Averaging with Limited Power and Privacy Budgets | arXiv | 2023 | Link |
| P3LI5: Practical and Confidential Lawful Interception on the 5G Core | arXiv | 2023 | Link |
| PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning | arXiv | 2023 | Link |
| PATROL: Privacy-Oriented Pruning for Collaborative Inference Against Model Inversion Attacks | arXiv | 2023 | Link |
| PEOPL: Characterizing Privately Encoded Open Datasets with Public Labels | arXiv | 2023 | Link |
| PPIDSG: A Privacy-Preserving Image Distribution Sharing Scheme with GAN in Federated Learning | arXiv | 2023 | Link |
| PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender | arXiv | 2023 | Link |
| PROFL: A Privacy-Preserving Federated Learning Method with Stringent Defense Against Poisoning Attacks | arXiv | 2023 | Link |
| PUGAN: Physical Model-Guided Underwater Image Enhancement Using GAN with Dual-Discriminators | arXiv | 2023 | Link |
| PandaLM: An Automatic Evaluation Benchmark for LLM Instruction Tuning Optimization | arXiv | 2023 | Link |
| Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes | arXiv | 2023 | Link |
| Performance Analysis of Finite Blocklength Transmissions Over Wiretap Fading Channels: An Average Information Leakage Perspective | arXiv | 2023 | Link |
| Poincaré Differential Privacy for Hierarchy-Aware Graph Embedding | arXiv | 2023 | Link |
| PolicyGPT: Automated Analysis of Privacy Policies with Large Language Models | arXiv | 2023 | Link |
| Precise Phase Error Rate Analysis for Quantum Key Distribution with Phase Postselection | arXiv | 2023 | Link |
| PriPrune: Quantifying and Preserving Privacy in Pruned Federated Learning | arXiv | 2023 | Link |
| PrivLM-Bench: A Multi-level Privacy Evaluation Benchmark for Language Models | arXiv | 2023 | Link |
| Privacy Assessment on Reconstructed Images: Are Existing Evaluation Metrics Faithful to Human Perception? | arXiv | 2023 | Link |
| Privacy Computing Meets Metaverse: Necessity, Taxonomy and Challenges | arXiv | 2023 | Link |
| Privacy Preserving Federated Learning with Convolutional Variational Bottlenecks | arXiv | 2023 | Link |
| Privacy Risks in Reinforcement Learning for Household Robots | arXiv | 2023 | Link |
| Privacy and Accuracy Implications of Model Complexity and Integration in Heterogeneous Federated Learning | arXiv | 2023 | Link |
| Privacy and Security in Ubiquitous Integrated Sensing and Communication: Threats, Challenges and Future Directions | arXiv | 2023 | Link |
| Privacy-Aware Data Acquisition under Data Similarity in Regression Markets | arXiv | 2023 | Link |
| Privacy-Preserved Neural Graph Databases | arXiv | 2023 | Link |
| Privacy-Preserving Federated Discovery of DNA Motifs with Differential Privacy | arXiv | 2023 | Link |
| Privacy-Preserving Hierarchical Anonymization Framework over Encrypted Data | arXiv | 2023 | Link |
| Privacy-Preserving Individual-Level COVID-19 Infection Prediction via Federated Graph Learning | arXiv | 2023 | Link |
| Privacy-Preserving Joint Edge Association and Power Optimization for the Internet of Vehicles via Federated Multi-Agent Reinforcement Learning | arXiv | 2023 | Link |
| Privacy-Preserving Load Forecasting via Personalized Model Obfuscation | arXiv | 2023 | Link |
| Privacy-Preserving Push-Pull Method for Decentralized Optimization via State Decomposition | arXiv | 2023 | Link |
| Privacy-Preserving Task-Oriented Semantic Communications Against Model Inversion Attacks | arXiv | 2023 | Link |
| Privacy-Preserving Video Conferencing via Thermal-Generative Images | arXiv | 2023 | Link |
| Privacy-preserving and Uncertainty-aware Federated Trajectory Prediction for Connected Autonomous Vehicles | arXiv | 2023 | Link |
| Privacy-preserving design of graph neural networks with applications to vertical federated learning | arXiv | 2023 | Link |
| Privacy-preserving quantum federated learning via gradient hiding | arXiv | 2023 | Link |
| PrivacyMind: Large Language Models Can Be Contextual Privacy Protection Learners | arXiv | 2023 | Link |
| Private Gradient Estimation is Useful for Generative Modeling | arXiv | 2023 | Link |
| Private Read-Update-Write with Controllable Information Leakage for Storage-Efficient Federated Learning with Top $r$ Sparsification | arXiv | 2023 | Link |
| ProPILE: Probing Privacy Leakage in Large Language Models | arXiv | 2023 | Link |
| Probably Approximately Correct Federated Learning | arXiv | 2023 | Link |
| Probing the Transition to Dataset-Level Privacy in ML Models Using an Output-Specific and Data-Resolved Privacy Profile | arXiv | 2023 | Link |
| Protecting User Privacy in Remote Conversational Systems: A Privacy-Preserving framework based on text sanitization | arXiv | 2023 | Link |
| Proving the Absence of Microarchitectural Timing Channels | arXiv | 2023 | Link |
| Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network | arXiv | 2023 | Link |
| Quadratic Functional Encryption for Secure Training in Vertical Federated Learning | arXiv | 2023 | Link |
| Quantifying Association Capabilities of Large Language Models and Its Implications on Privacy Leakage | arXiv | 2023 | Link |
| RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation | arXiv | 2023 | Link |
| Raptor Encoding for Low-Latency Concurrent Multi-PDU Session Transmission with Security Consideration in B5G Edge Network | arXiv | 2023 | Link |
| Re-Temp: Relation-Aware Temporal Representation Learning for Temporal Knowledge Graph Completion | arXiv | 2023 | Link |
| Re-thinking Model Inversion Attacks Against Deep Neural Networks | arXiv | 2023 | Link |
| RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense | arXiv | 2023 | Link |
| Reconciling AI Performance and Data Reconstruction Resilience for Medical Imaging | arXiv | 2023 | Link |
| Reinforcement Learning-Based Black-Box Model Inversion Attacks | arXiv | 2023 | Link |
| Relating EEG to continuous speech using deep neural networks: a review | arXiv | 2023 | Link |
| Reliable Generation of Privacy-preserving Synthetic Electronic Health Record Time Series via Diffusion Models | arXiv | 2023 | Link |
| Report of the Medical Image De-Identification (MIDI) Task Group -- Best Practices and Recommendations | arXiv | 2023 | Link |
| Rethinking Cross-Subject Data Splitting for Brain-to-Text Decoding | arXiv | 2023 | Link |
| Rethinking Model Inversion Attacks With Patch-Wise Reconstruction | arXiv | 2023 | Link |
| Rethinking Speech Recognition with A Multimodal Perspective via Acoustic and Semantic Cooperative Decoding | arXiv | 2023 | Link |
| Rethinking the Evaluation Protocol of Domain Generalization | arXiv | 2023 | Link |
| Revisiting Variable Ordering for Real Quantifier Elimination using Machine Learning | arXiv | 2023 | Link |
| SSO-Monitor: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild | arXiv | 2023 | Link |
| STAR-RIS-Assisted Privacy Protection in Semantic Communication System | arXiv | 2023 | Link |
| Scale Federated Learning for Label Set Mismatch in Medical Image Classification | arXiv | 2023 | Link |
| Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction | arXiv | 2023 | Link |
| SciEval: A Multi-Level Large Language Model Evaluation Benchmark for Scientific Research | arXiv | 2023 | Link |
| Secret-Keeping in Question Answering | arXiv | 2023 | Link |
| Secure Block Joint Source-Channel Coding with Sequential Encoding | arXiv | 2023 | Link |
| Secure Deep-JSCC Against Multiple Eavesdroppers | arXiv | 2023 | Link |
| Secure Integrated Sensing and Communication | arXiv | 2023 | Link |
| Secure Key from Quantum Discord | arXiv | 2023 | Link |
| Secure Vertical Federated Learning Under Unreliable Connectivity | arXiv | 2023 | Link |
| SecureBoost Hyperparameter Tuning via Multi-Objective Federated Learning | arXiv | 2023 | Link |
| Security and Privacy Challenges in Deep Learning Models | arXiv | 2023 | Link |
| Security and Privacy on Generative Data in AIGC: A Survey | arXiv | 2023 | Link |
| SegPrompt: Boosting Open-world Segmentation via Category-level Prompt Learning | arXiv | 2023 | Link |
| Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode | arXiv | 2023 | Link |
| Semi-decentralized Federated Ego Graph Learning for Recommendation | arXiv | 2023 | Link |
| Sensing-Enhanced Secure Communication: Joint Time Allocation and Beamforming Design | arXiv | 2023 | Link |
| Sentence Embedding Leaks More Information than You Expect: Generative Embedding Inversion Attack to Recover the Whole Sentence | arXiv | 2023 | Link |
| Share Your Representation Only: Guaranteed Improvement of the Privacy-Utility Tradeoff in Federated Learning | arXiv | 2023 | Link |
| Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses | arXiv | 2023 | Link |
| SoK: Pitfalls in Evaluating Black-Box Attacks | arXiv | 2023 | Link |
| Sparse Federated Training of Object Detection in the Internet of Vehicles | arXiv | 2023 | Link |
| Speaker anonymization using orthogonal Householder neural network | arXiv | 2023 | Link |
| Speech Privacy Leakage from Shared Gradients in Distributed Learning | arXiv | 2023 | Link |
| Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning | arXiv | 2023 | Link |
| Split Without a Leak: Reducing Privacy Leakage in Split Learning | arXiv | 2023 | Link |
| Split-and-Denoise: Protect large language model inference with local differential privacy | arXiv | 2023 | Link |
| SplitAMC: Split Learning for Robust Automatic Modulation Classification | arXiv | 2023 | Link |
| SplitGNN: Splitting GNN for Node Classification with Heterogeneous Attention | arXiv | 2023 | Link |
| Stochastic dual coordinate descent with adaptive heavy ball momentum for linearly constrained convex optimization | arXiv | 2023 | Link |
| Students Parrot Their Teachers: Membership Inference on Model Distillation | arXiv | 2023 | Link |
| Surrogate Model Extension (SME): A Fast and Accurate Weight Update Attack on Federated Learning | arXiv | 2023 | Link |
| Sync+Sync: A Covert Channel Built on fsync with Storage | arXiv | 2023 | Link |
| Synthetic Misinformers: Generating and Combating Multimodal Misinformation | arXiv | 2023 | Link |
| SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not? | arXiv | 2023 | Link |
| Targeted Image Reconstruction by Sampling Pre-trained Diffusion Model | arXiv | 2023 | Link |
| TeD-SPAD: Temporal Distinctiveness for Self-supervised Privacy-preservation for video Anomaly Detection | arXiv | 2023 | Link |
| Temporal Gradient Inversion Attacks with Robust Optimization | arXiv | 2023 | Link |
| Text-to-image Editing by Image Information Removal | arXiv | 2023 | Link |
| The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks | arXiv | 2023 | Link |
| The Model Inversion Eavesdropping Attack in Semantic Communication Systems | arXiv | 2023 | Link |
| Tight Auditing of Differentially Private Machine Learning | arXiv | 2023 | Link |
| Timeliness: A New Design Metric and a New Attack Surface | arXiv | 2023 | Link |
| Topology-Dependent Privacy Bound For Decentralized Federated Learning | arXiv | 2023 | Link |
| Toward the Tradeoffs between Privacy, Fairness and Utility in Federated Learning | arXiv | 2023 | Link |
| Towards A Holistic Landscape of Situated Theory of Mind in Large Language Models | arXiv | 2023 | Link |
| Towards Multiple References Era -- Addressing Data Leakage and Limited Reference Diversity in NLG Evaluation | arXiv | 2023 | Link |
| Towards Runtime Customizable Trusted Execution Environment on FPGA-SoC | arXiv | 2023 | Link |
| Towards the Flatter Landscape and Better Generalization in Federated Learning under Client-level Differential Privacy | arXiv | 2023 | Link |
| Traces of Memorisation in Large Language Models for Code | arXiv | 2023 | Link |
| Training Private Models That Know What They Don't Know | arXiv | 2023 | Link |
| Transceiver Cooperative Learning-aided Semantic Communications Against Mismatched Background Knowledge Bases | arXiv | 2023 | Link |
| Transient Attacks against the VMG-KLJN Secure Key Exchanger | arXiv | 2023 | Link |
| TriMLP: Revenge of a MLP-like Architecture in Sequential Recommendation | arXiv | 2023 | Link |
| UFPS: A unified framework for partially-annotated federated segmentation in heterogeneous data distribution | arXiv | 2023 | Link |
| Unconditionally secure ciphers with a short key for a source with unknown statistics | arXiv | 2023 | Link |
| Understanding Deep Gradient Leakage via Inversion Influence Functions | arXiv | 2023 | Link |
| Unifying Privacy Measures via Maximal $(α,β)$-Leakage (M$α$beL) | arXiv | 2023 | Link |
| Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation | arXiv | 2023 | Link |
| Unstoppable Attack: Label-Only Model Inversion via Conditional Diffusion Model | arXiv | 2023 | Link |
| Untargeted Near-collision Attacks on Biometrics: Real-world Bounds and Theoretical Limits | arXiv | 2023 | Link |
| Unveiling the Role of Message Passing in Dual-Privacy Preservation on GNNs | arXiv | 2023 | Link |
| User Consented Federated Recommender System Against Personalized Attribute Inference Attack | arXiv | 2023 | Link |
| VeriDIP: Verifying Ownership of Deep Neural Networks through Privacy Leakage Fingerprints | arXiv | 2023 | Link |
| Watch Out! Smartwatches as criminal tool and digital forensic investigations | arXiv | 2023 | Link |
| What can we learn from Data Leakage and Unlearning for Law? | arXiv | 2023 | Link |
| When Evolutionary Computation Meets Privacy | arXiv | 2023 | Link |
| When Fairness Meets Privacy: Exploring Privacy Threats in Fair Binary Classifiers via Membership Inference Attacks | arXiv | 2023 | Link |
| Where have you been? A Study of Privacy Risk for Point-of-Interest Recommendation | arXiv | 2023 | Link |
| Why People Skip Music? On Predicting Music Skips using Deep Reinforcement Learning | arXiv | 2023 | Link |
| Within-Dataset Disclosure Risk for Differential Privacy | arXiv | 2023 | Link |
| XFedHunter: An Explainable Federated Learning Framework for Advanced Persistent Threat Detection in SDN | arXiv | 2023 | Link |
| Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME | arXiv | 2023 | Link |
| Zero-Knowledge Proof-based Practical Federated Learning on Blockchain | arXiv | 2023 | Link |
| ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching | arXiv | 2023 | Link |
| ZhuJiu: A Multi-dimensional, Multi-faceted Chinese Benchmark for Large Language Models | arXiv | 2023 | Link |
| cRVR: A Stackelberg Game Approach for Joint Privacy-Aware Video Requesting and Edge Caching | arXiv | 2023 | Link |
| pFedSim: Similarity-Aware Model Aggregation Towards Personalized Federated Learning | arXiv | 2023 | Link |
| λ-SecAgg: Partial Vector Freezing for Lightweight Secure Aggregation in Federated Learning | arXiv | 2023 | Link |
2022
| Title | Venue | Year | Link |
|---|---|---|---|
| $\texttt{GradICON}$: Approximate Diffeomorphisms via Gradient Inverse Consistency | arXiv | 2022 | Link |
| A Bargaining Game for Personalized, Energy Efficient Split Learning over Wireless Networks | arXiv | 2022 | Link |
| A Benchmark for Federated Hetero-Task Learning | arXiv | 2022 | Link |
| A Consistent and Efficient Evaluation Strategy for Attribution Methods | arXiv | 2022 | Link |
| A Data-Based Perspective on Transfer Learning | arXiv | 2022 | Link |
| A Differentially Private Framework for Deep Learning with Convexified Loss Functions | arXiv | 2022 | Link |
| A Framework for Evaluating Privacy-Utility Trade-off in Vertical Federated Learning | arXiv | 2022 | Link |
| A Generalization of the Stratonovich's Value of Information and Application to Privacy-Utility Trade-off | arXiv | 2022 | Link |
| A Holistic View on Data Protection for Sharing, Communicating, and Computing Environments: Taxonomy and Future Directions | arXiv | 2022 | Link |
| A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices | arXiv | 2022 | Link |
| A New Dimensionality Reduction Method Based on Hensel's Compression for Privacy Protection in Federated Learning | arXiv | 2022 | Link |
| A Novel Location Free Link Prediction in Multiplex Social Networks | arXiv | 2022 | Link |
| A Platform-Free Proof of Federated Learning Consensus Mechanism for Sustainable Blockchains | arXiv | 2022 | Link |
| A Survey on Gradient Inversion: Attacks, Defenses and Future Directions | arXiv | 2022 | Link |
| A Survey on Privacy of Personal and Non-Personal Data in B5G/6G Networks | arXiv | 2022 | Link |
| A Unified Framework for Quantifying Privacy Risk in Synthetic Data | arXiv | 2022 | Link |
| A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage | arXiv | 2022 | Link |
| A blockchain-based secure storage scheme for medical information | arXiv | 2022 | Link |
| A kind of quantum dialogue protocols without information leakage assisted by auxiliary quantum operation | arXiv | 2022 | Link |
| AGIC: Approximate Gradient Inversion Attack on Federated Learning | arXiv | 2022 | Link |
| Abstract Interpretation-Based Data Leakage Static Analysis | arXiv | 2022 | Link |
| Acceleration of Federated Learning with Alleviated Forgetting in Local Training | arXiv | 2022 | Link |
| Adversarial Mutual Leakage Network for Cell Image Segmentation | arXiv | 2022 | Link |
| Adversarial Representation Sharing: A Quantitative and Secure Collaborative Learning Framework | arXiv | 2022 | Link |
| Adversarial Speaker Distillation for Countermeasure Model on Automatic Speaker Verification | arXiv | 2022 | Link |
| Adversarially Robust Classification by Conditional Generative Model Inversion | arXiv | 2022 | Link |
| Amplifying Membership Exposure via Data Poisoning | arXiv | 2022 | Link |
| An Algorithm for Computing the Stratonovich's Value of Information | arXiv | 2022 | Link |
| An Alphabet of Leakage Measures | arXiv | 2022 | Link |
| An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems | arXiv | 2022 | Link |
| An Automated Approach for Privacy Leakage Identification in IoT Apps | arXiv | 2022 | Link |
| An Empirical Study on Data Leakage and Generalizability of Link Prediction Models for Issues and Commits | arXiv | 2022 | Link |
| An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models | arXiv | 2022 | Link |
| An Experimental Study on Private Aggregation of Teacher Ensemble Learning for End-to-End Speech Recognition | arXiv | 2022 | Link |
| An Operational Approach to Information Leakage via Generalized Gain Functions | arXiv | 2022 | Link |
| Analog Secure Distributed Matrix Multiplication over Complex Numbers | arXiv | 2022 | Link |
| Analysing Training-Data Leakage from Gradients through Linear Systems and Gradient Matching | arXiv | 2022 | Link |
| Analyzing Privacy Leakage in Machine Learning via Multiple Hypothesis Testing: A Lesson From Fano | arXiv | 2022 | Link |
| Another Use of SMOTE for Interpretable Data Collaboration Analysis | arXiv | 2022 | Link |
| Answering Count Queries for Genomic Data with Perfect Privacy | arXiv | 2022 | Link |
| Application of Data Encryption in Chinese Named Entity Recognition | arXiv | 2022 | Link |
| Application of federated learning techniques for arrhythmia classification using 12-lead ECG signals | arXiv | 2022 | Link |
| Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models | arXiv | 2022 | Link |
| Assessing Privacy Leakage in Synthetic 3-D PET Imaging using Transversal GAN | arXiv | 2022 | Link |
| Assessing the Effects of Hyperparameters on Knowledge Graph Embedding Quality | arXiv | 2022 | Link |
| Asymmetric Local Information Privacy and the Watchdog Mechanism | arXiv | 2022 | Link |
| Auditing Privacy Defenses in Federated Learning via Generative Gradient Leakage | arXiv | 2022 | Link |
| AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks | arXiv | 2022 | Link |
| Automatic detection of access control vulnerabilities via API specification processing | arXiv | 2022 | Link |
| Behavioral Model For Live Detection of Apps Based Attack | arXiv | 2022 | Link |
| Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks | arXiv | 2022 | Link |
| Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction | arXiv | 2022 | Link |
| Biometric Identification Systems With Both Chosen and Generated Secret Keys by Allowing Correlation | arXiv | 2022 | Link |
| Blockchain-based Federated Learning for Industrial Metaverses: Incentive Scheme with Optimal AoI | arXiv | 2022 | Link |
| Bounding Training Data Reconstruction in Private (Deep) Learning | arXiv | 2022 | Link |
| Bounds for Privacy-Utility Trade-off with Per-letter Privacy Constraints and Non-zero Leakage | arXiv | 2022 | Link |
| CANIFE: Crafting Canaries for Empirical Privacy Measurement in Federated Learning | arXiv | 2022 | Link |
| CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software | arXiv | 2022 | Link |
| Can Shadows Reveal Biometric Information? | arXiv | 2022 | Link |
| Canary Extraction in Natural Language Understanding Models | arXiv | 2022 | Link |
| Channel State Information-Free Artificial Noise-Aided Location-Privacy Enhancement | arXiv | 2022 | Link |
| Cluster Based Secure Multi-Party Computation in Federated Learning for Histopathology Images | arXiv | 2022 | Link |
| Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis | arXiv | 2022 | Link |
| Combing for Credentials: Active Pattern Extraction from Smart Reply | arXiv | 2022 | Link |
| Combining Stochastic Defenses to Resist Gradient Inversion: An Ablation Study | arXiv | 2022 | Link |
| Communication-Efficient Diffusion Strategy for Performance Improvement of Federated Learning with Non-IID Data | arXiv | 2022 | Link |
| Concealing Sensitive Samples against Gradient Leakage in Federated Learning | arXiv | 2022 | Link |
| Content Privacy Enforcement Models in Decentralized Online Social Networks: State of Play, Solutions, Limitations, and Future Directions | arXiv | 2022 | Link |
| ConvMAE: Masked Convolution Meets Masked Autoencoders | arXiv | 2022 | Link |
| Cryptographic Security Concerns on Timestamp Sharing via Public Channel in Quantum Key Distribution Systems | arXiv | 2022 | Link |
| DRAG: Dynamic Region-Aware GCN for Privacy-Leaking Image Detection | arXiv | 2022 | Link |
| Data Leakage and Evaluation Issues in Micro-Expression Analysis | arXiv | 2022 | Link |
| Data Leakage in Federated Averaging | arXiv | 2022 | Link |
| Data Leakage in Notebooks: Static Detection and Better Processes | arXiv | 2022 | Link |
| Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems | arXiv | 2022 | Link |
| Data Querying with Ciphertext Policy Attribute Based Encryption | arXiv | 2022 | Link |
| Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes? | arXiv | 2022 | Link |
| Data security as a top priority in the digital world: preserve data value by being proactive and thinking security first | arXiv | 2022 | Link |
| Dataset Obfuscation: Its Applications to and Impacts on Edge Machine Learning | arXiv | 2022 | Link |
| DeFTA: A Plug-and-Play Decentralized Replacement for FedAvg | arXiv | 2022 | Link |
| Decentralized Complete Dictionary Learning via $\ell^{4}$-Norm Maximization | arXiv | 2022 | Link |
| Decentralized Matrix Factorization with Heterogeneous Differential Privacy | arXiv | 2022 | Link |
| Deep Equilibrium Approaches to Diffusion Models | arXiv | 2022 | Link |
| DeepVulSeeker: A Novel Vulnerability Identification Framework via Code Graph Structure and Pre-training Mechanism | arXiv | 2022 | Link |
| Defending against the Label-flipping Attack in Federated Learning | arXiv | 2022 | Link |
| Defense Against Gradient Leakage Attacks via Learning to Obscure Data | arXiv | 2022 | Link |
| Desirable Companion for Vertical Federated Learning: New Zeroth-Order Gradient Based Algorithm | arXiv | 2022 | Link |
| Detecting Chronic Kidney Disease(CKD) at the Initial Stage: A Novel Hybrid Feature-selection Method and Robust Data Preparation Pipeline for Different ML Techniques | arXiv | 2022 | Link |
| Detecting False Alarms from Automatic Static Analysis Tools: How Far are We? | arXiv | 2022 | Link |
| Differential Privacy Guarantees for Stochastic Gradient Langevin Dynamics | arXiv | 2022 | Link |
| Differentially Private ADMM-Based Distributed Discrete Optimal Transport for Resource Allocation | arXiv | 2022 | Link |
| Differentially Private CutMix for Split Learning with Vision Transformer | arXiv | 2022 | Link |
| Differentially Private Decentralized Optimization with Relay Communication | arXiv | 2022 | Link |
| Differentially Private Generative Adversarial Networks with Model Inversion | arXiv | 2022 | Link |
| Disentangling private classes through regularization | arXiv | 2022 | Link |
| Distributed Non-Convex Optimization with One-Bit Compressors on Heterogeneous Data: Efficient and Resilient Algorithms | arXiv | 2022 | Link |
| Distributed learning optimisation of Cox models can leak patient data: Risks and solutions | arXiv | 2022 | Link |
| Distribution inference risks: Identifying and mitigating sources of leakage | arXiv | 2022 | Link |
| Do Gradient Inversion Attacks Make Federated Learning Unsafe? | arXiv | 2022 | Link |
| Dordis: Efficient Federated Learning with Dropout-Resilient Differential Privacy | arXiv | 2022 | Link |
| Dropout is NOT All You Need to Prevent Gradient Leakage | arXiv | 2022 | Link |
| Dynamic Event-Triggered Discrete-Time Linear Time-Varying System with Privacy-Preservation | arXiv | 2022 | Link |
| ECG Heartbeat classification using deep transfer learning with Convolutional Neural Network and STFT technique | arXiv | 2022 | Link |
| Efficacy of MRI data harmonization in the age of machine learning. A multicenter study across 36 datasets | arXiv | 2022 | Link |
| Efficient Federated Learning on Knowledge Graphs via Privacy-preserving Relation Embedding Aggregation | arXiv | 2022 | Link |
| Efficient Federated Learning with Spike Neural Networks for Traffic Sign Recognition | arXiv | 2022 | Link |
| Efficient Private Storage of Sparse Machine Learning Data | arXiv | 2022 | Link |
| Encrypted Semantic Communication Using Adversarial Training for Privacy Preserving | arXiv | 2022 | Link |
| Enhancing Privacy against Inversion Attacks in Federated Learning by using Mixing Gradients Strategies | arXiv | 2022 | Link |
| Exploiting Multiple EEG Data Domains with Adversarial Learning | arXiv | 2022 | Link |
| Exploring Semantic Attributes from A Foundation Model for Federated Learning of Disjoint Label Spaces | arXiv | 2022 | Link |
| Extracted BERT Model Leaks More Information than You Think! | arXiv | 2022 | Link |
| Extracting Targeted Training Data from ASR Models, and How to Mitigate It | arXiv | 2022 | Link |
| FIAT: Fine-grained Information Audit for Trustless Transborder Data Flow | arXiv | 2022 | Link |
| FLVoogd: Robust And Privacy Preserving Federated Learning | arXiv | 2022 | Link |
| FaceMAE: Privacy-Preserving Face Recognition via Masked Autoencoders | arXiv | 2022 | Link |
| FadMan: Federated Anomaly Detection across Multiple Attributed Networks | arXiv | 2022 | Link |
| Fault tolerant authenticated quantum dialogue using logical Bell states | arXiv | 2022 | Link |
| Fault tolerant channel-encrypting quantum dialogue against collective noise | arXiv | 2022 | Link |
| FedIIC: Towards Robust Federated Learning for Class-Imbalanced Medical Image Classification | arXiv | 2022 | Link |
| Federated Bayesian Neural Regression: A Scalable Global Federated Gaussian Process | arXiv | 2022 | Link |
| Federated Learning for Healthcare Domain - Pipeline, Applications and Challenges | arXiv | 2022 | Link |
| Federated Learning on Heterogeneous and Long-Tailed Data via Classifier Re-Training with Federated Features | arXiv | 2022 | Link |
| Federated Learning with Privacy-Preserving Ensemble Attention Distillation | arXiv | 2022 | Link |
| Federated Stochastic Primal-dual Learning with Differential Privacy | arXiv | 2022 | Link |
| Few-Shot Unlearning by Model Inversion | arXiv | 2022 | Link |
| Finite Time Privacy Preserving Quantized Average Consensus with Transmission Stopping | arXiv | 2022 | Link |
| Frequency Estimation of Evolving Data Under Local Differential Privacy | arXiv | 2022 | Link |
| Frequency Throttling Side-Channel Attack | arXiv | 2022 | Link |
| Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints | arXiv | 2022 | Link |
| Function Computation Without Secure Links: Information and Leakage Rates | arXiv | 2022 | Link |
| GAN-based Domain Inference Attack | arXiv | 2022 | Link |
| Get your Foes Fooled: Proximal Gradient Split Learning for Defense against Model Inversion Attacks on IoMT data | arXiv | 2022 | Link |
| Global dynamics of neural mass models | arXiv | 2022 | Link |
| GradViT: Gradient Inversion of Vision Transformers | arXiv | 2022 | Link |
| Gradient Obfuscation Gives a False Sense of Security in Federated Learning | arXiv | 2022 | Link |
| Guaranteeing Timed Opacity using Parametric Timed Model Checking | arXiv | 2022 | Link |
| Guidance Through Surrogate: Towards a Generic Diagnostic Attack | arXiv | 2022 | Link |
| HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning | arXiv | 2022 | Link |
| Heterogeneous Graph Neural Network for Privacy-Preserving Recommendation | arXiv | 2022 | Link |
| Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks | arXiv | 2022 | Link |
| Hidden in Plain Sight: Exploring Encrypted Channels in Android apps | arXiv | 2022 | Link |
| How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers | arXiv | 2022 | Link |
| How Much Privacy Does Federated Learning with Secure Aggregation Guarantee? | arXiv | 2022 | Link |
| Hyper-differential sensitivity analysis for nonlinear Bayesian inverse problems | arXiv | 2022 | Link |
| Hyperspectral Image Super-resolution with Deep Priors and Degradation Model Inversion | arXiv | 2022 | Link |
| I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy | arXiv | 2022 | Link |
| ILSGAN: Independent Layer Synthesis for Unsupervised Foreground-Background Segmentation | arXiv | 2022 | Link |
| Improved Finite-Key Security Analysis of Quantum Key Distribution Against Trojan-Horse Attacks | arXiv | 2022 | Link |
| Improved Weakly Private Information Retrieval Codes | arXiv | 2022 | Link |
| Improving Federated Learning Face Recognition via Privacy-Agnostic Clusters | arXiv | 2022 | Link |
| Improving Response Time of Home IoT Services in Federated Learning | arXiv | 2022 | Link |
| Incentive-boosted Federated Crowdsourcing | arXiv | 2022 | Link |
| Increasing Physical Layer Security through Hyperchaos in VLC Systems | arXiv | 2022 | Link |
| Inflation of test accuracy due to data leakage in deep learning-based classification of OCT images | arXiv | 2022 | Link |
| Information Leakage in Index Coding | arXiv | 2022 | Link |
| Information Leakage in Index Coding With Sensitive and Non-Sensitive Messages | arXiv | 2022 | Link |
| Information leakage resistant quantum dialogue against collective noise | arXiv | 2022 | Link |
| Information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom | arXiv | 2022 | Link |
| Intelligent Reflecting Surfaces for Enhanced Physical Layer Security in NOMA VLC Systems | arXiv | 2022 | Link |
| Introspective Learning : A Two-Stage Approach for Inference in Neural Networks | arXiv | 2022 | Link |
| Inverse uncertainty quantification of a mechanical model of arterial tissue with surrogate modeling | arXiv | 2022 | Link |
| Invertible Tabular GANs: Killing Two Birds with OneStone for Tabular Data Synthesis | arXiv | 2022 | Link |
| Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive Privacy Analysis and Beyond | arXiv | 2022 | Link |
| Joint Optimization for Secure and Reliable Communications in Finite Blocklength Regime | arXiv | 2022 | Link |
| Joint Privacy Enhancement and Quantization in Federated Learning | arXiv | 2022 | Link |
| Just Fine-tune Twice: Selective Differential Privacy for Large Language Models | arXiv | 2022 | Link |
| LSTMSPLIT: Effective SPLIT Learning based LSTM on Sequential Time-Series Data | arXiv | 2022 | Link |
| Label Leakage and Protection from Forward Embedding in Vertical Federated Learning | arXiv | 2022 | Link |
| Label-Only Model Inversion Attacks via Boundary Repulsion | arXiv | 2022 | Link |
| Label-only Model Inversion Attack: The Attack that Requires the Least Information | arXiv | 2022 | Link |
| Language Models as Knowledge Embeddings | arXiv | 2022 | Link |
| Large payload bidirectional quantum secure direct communication without information leakage | arXiv | 2022 | Link |
| Leakage and the Reproducibility Crisis in ML-based Science | arXiv | 2022 | Link |
| Learned-Database Systems Security | arXiv | 2022 | Link |
| Learning to Censor by Noisy Sampling | arXiv | 2022 | Link |
| Learning to Invert: Simple Adaptive Attacks for Gradient Inversion in Federated Learning | arXiv | 2022 | Link |
| Leveraging Adversarial Examples to Quantify Membership Information Leakage | arXiv | 2022 | Link |
| LightFR: Lightweight Federated Recommendation with Privacy-preserving Matrix Factorization | arXiv | 2022 | Link |
| Local inversion of maps: A new attack on Symmetric encryption, RSA and ECDLP | arXiv | 2022 | Link |
| Lossy Compression of Noisy Data for Private and Data-Efficient Learning | arXiv | 2022 | Link |
| Lower Bounds for Rényi Differential Privacy in a Black-Box Setting | arXiv | 2022 | Link |
| MC-GEN:Multi-level Clustering for Private Synthetic Data Generation | arXiv | 2022 | Link |
| MOB-FL: Mobility-Aware Federated Learning for Intelligent Connected Vehicles | arXiv | 2022 | Link |
| M^4I: Multi-modal Models Membership Inference | arXiv | 2022 | Link |
| Machine Learning Security in Industry: A Quantitative Survey | arXiv | 2022 | Link |
| Masked Jigsaw Puzzle: A Versatile Position Embedding for Vision Transformers | arXiv | 2022 | Link |
| Measuring and Controlling Split Layer Privacy Leakage Using Fisher Information | arXiv | 2022 | Link |
| Mesoscopic modeling of hidden spiking neurons | arXiv | 2022 | Link |
| Minimizing Information Leakage under Padding Constraints | arXiv | 2022 | Link |
| Misinformation Detection in Social Media Video Posts | arXiv | 2022 | Link |
| Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It | arXiv | 2022 | Link |
| Model Inversion Attacks against Graph Neural Networks | arXiv | 2022 | Link |
| Model Segmentation for Storage Efficient Private Federated Learning with Top $r$ Sparsification | arXiv | 2022 | Link |
| Modeling Global Distribution for Federated Learning with Label Distribution Skew | arXiv | 2022 | Link |
| Muffliato: Peer-to-Peer Privacy Amplification for Decentralized Optimization and Averaging | arXiv | 2022 | Link |
| Multi-party Quantum Private Comparison Protocol Based on Entanglement Swapping of Bell Entangled States | arXiv | 2022 | Link |
| Multi-site benchmark classification of major depressive disorder using machine learning on cortical and subcortical measures | arXiv | 2022 | Link |
| NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language | arXiv | 2022 | Link |
| On Differential Privacy for Federated Learning in Wireless Systems with Multiple Base Stations | arXiv | 2022 | Link |
| On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols | arXiv | 2022 | Link |
| On the (In)security of Peer-to-Peer Decentralized Machine Learning | arXiv | 2022 | Link |
| On the Choice of Databases in Differential Privacy Composition | arXiv | 2022 | Link |
| On the Discredibility of Membership Inference Attacks | arXiv | 2022 | Link |
| On the Privacy Effect of Data Enhancement via the Lens of Memorization | arXiv | 2022 | Link |
| On the Privacy Risks of Algorithmic Recourse | arXiv | 2022 | Link |
| On the Privacy-Utility Trade-off With and Without Direct Access to the Private Data | arXiv | 2022 | Link |
| On the utility and protection of optimization with differential privacy and classic regularization techniques | arXiv | 2022 | Link |
| On-device modeling of user's social context and familiar places from smartphone-embedded sensor data | arXiv | 2022 | Link |
| One Bad Apple Can Spoil Your IPv6 Privacy | arXiv | 2022 | Link |
| One Parameter Defense -- Defending against Data Inference Attacks via Differential Privacy | arXiv | 2022 | Link |
| OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization | arXiv | 2022 | Link |
| Optimal design of large-scale nonlinear Bayesian inverse problems under model uncertainty | arXiv | 2022 | Link |
| Over-the-Air Federated Learning with Privacy Protection via Correlated Additive Perturbations | arXiv | 2022 | Link |
| PASS: A Parameter Audit-based Secure and Fair Federated Learning Scheme against Free-Rider Attack | arXiv | 2022 | Link |
| PGFed: Personalize Each Client's Global Objective for Federated Learning | arXiv | 2022 | Link |
| PPA: Preference Profiling Attack Against Federated Learning | arXiv | 2022 | Link |
| PRIVIC: A privacy-preserving method for incremental collection of location data | arXiv | 2022 | Link |
| Partially Oblivious Neural Network Inference | arXiv | 2022 | Link |
| Personal Privacy Protection Problems in the Digital Age | arXiv | 2022 | Link |
| Physical layer insecurity | arXiv | 2022 | Link |
| Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks | arXiv | 2022 | Link |
| Plug-In Inversion: Model-Agnostic Inversion for Vision with Data Augmentations | arXiv | 2022 | Link |
| Pointwise Maximal Leakage | arXiv | 2022 | Link |
| Predicting sensitive information leakage in IoT applications using flows-aware machine learning approach | arXiv | 2022 | Link |
| Preserving Privacy in Federated Learning with Ensemble Cross-Domain Knowledge Distillation | arXiv | 2022 | Link |
| Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models | arXiv | 2022 | Link |
| Privacy Concerns Raised by Pervasive User Data Collection From Cyberspace and Their Countermeasures | arXiv | 2022 | Link |
| Privacy Induces Robustness: Information-Computation Gaps and Sparse Mean Estimation | arXiv | 2022 | Link |
| Privacy Leakage in Discrete Time Updating Systems | arXiv | 2022 | Link |
| Privacy Leakage in Proactive VR Streaming: Modeling and Tradeoff | arXiv | 2022 | Link |
| Privacy Leakage in Text Classification: A Data Extraction Approach | arXiv | 2022 | Link |
| Privacy Leakage of Adversarial Training Models in Federated Learning Systems | arXiv | 2022 | Link |
| Privacy Preserving Machine Learning for Electric Vehicles: A Survey | arXiv | 2022 | Link |
| Privacy Preserving Release of Mobile Sensor Data | arXiv | 2022 | Link |
| Privacy for Free: How does Dataset Condensation Help Privacy? | arXiv | 2022 | Link |
| Privacy in Practice: Private COVID-19 Detection in X-Ray Images (Extended Version) | arXiv | 2022 | Link |
| Privacy-Aware Adversarial Network in Human Mobility Prediction | arXiv | 2022 | Link |
| Privacy-Aware Human Mobility Prediction via Adversarial Networks | arXiv | 2022 | Link |
| Privacy-Preserving Collaborative Learning through Feature Extraction | arXiv | 2022 | Link |
| Privacy-Preserving Data-Enabled Predictive Leading Cruise Control in Mixed Traffic | arXiv | 2022 | Link |
| Privacy-Preserving Decentralized Inference with Graph Neural Networks in Wireless Networks | arXiv | 2022 | Link |
| Privacy-Preserving Distributed Expectation Maximization for Gaussian Mixture Model using Subspace Perturbation | arXiv | 2022 | Link |
| Privacy-Preserving Federated Learning via System Immersion and Random Matrix Encryption | arXiv | 2022 | Link |
| Privacy-Preserving Synthetic Data Generation for Recommendation Systems | arXiv | 2022 | Link |
| Privacy-aware Early Detection of COVID-19 through Adversarial Training | arXiv | 2022 | Link |
| Private Graph Extraction via Feature Explanations | arXiv | 2022 | Link |
| Private Read Update Write (PRUW) in Federated Submodel Learning (FSL): Communication Efficient Schemes With and Without Sparsification | arXiv | 2022 | Link |
| Protecting Split Learning by Potential Energy Loss | arXiv | 2022 | Link |
| Providing Location Information at Edge Networks: A Federated Learning-Based Approach | arXiv | 2022 | Link |
| Purifier: Defending Data Inference Attacks via Transforming Confidence Scores | arXiv | 2022 | Link |
| Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing | arXiv | 2022 | Link |
| Quantitative Information Flow for Hardware: Advancing the Attack Landscape | arXiv | 2022 | Link |
| Quantum dialogue based on quantum encryption with single photons in both polarization and spatial-mode degrees of freedom | arXiv | 2022 | Link |
| Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state | arXiv | 2022 | Link |
| Quantum secure dialogue with quantum encryption | arXiv | 2022 | Link |
| R-DFCIL: Relation-Guided Representation Learning for Data-Free Class Incremental Learning | arXiv | 2022 | Link |
| RAIN: RegulArization on Input and Network for Black-Box Domain Adaptation | arXiv | 2022 | Link |
| RL-DistPrivacy: Privacy-Aware Distributed Deep Inference for low latency IoT systems | arXiv | 2022 | Link |
| Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks | arXiv | 2022 | Link |
| Rate-Privacy-Storage Tradeoff in Federated Learning with Top $r$ Sparsification | arXiv | 2022 | Link |
| Reconstruction Attacks on Aggressive Relaxations of Differential Privacy | arXiv | 2022 | Link |
| Redactor: A Data-centric and Individualized Defense Against Inference Attacks | arXiv | 2022 | Link |
| Reduced order modeling inversion of mono static data in a multi-scattering environment | arXiv | 2022 | Link |
| ResSFL: A Resistance Transfer Framework for Defending Model Inversion Attack in Split Federated Learning | arXiv | 2022 | Link |
| Residue-based Label Protection Mechanisms in Vertical Logistic Regression | arXiv | 2022 | Link |
| Revealing Cumulative Risks in Online Personal Information: A Data Narrative Study | arXiv | 2022 | Link |
| Robust Fingerprinting of Genomic Databases | arXiv | 2022 | Link |
| Robust and Secure Resource Allocation for ISAC Systems: A Novel Optimization Framework for Variable-Length Snapshots | arXiv | 2022 | Link |
| SINE: SINgle Image Editing with Text-to-Image Diffusion Models | arXiv | 2022 | Link |
| SPAct: Self-supervised Privacy Preservation for Action Recognition | arXiv | 2022 | Link |
| SSMI: How to Make Objects of Interest Disappear without Accessing Object Detectors? | arXiv | 2022 | Link |
| STELLA: Sparse Taint Analysis for Enclave Leakage Detection | arXiv | 2022 | Link |
| Sanitization of Multimedia Content: A Survey of Techniques, Attacks, and Future Directions | arXiv | 2022 | Link |
| Scalable and Sparsity-Aware Privacy-Preserving K-means Clustering with Application to Fraud Detection | arXiv | 2022 | Link |
| SecSkyline: Fast Privacy-Preserving Skyline Queries over Encrypted Cloud Databases | arXiv | 2022 | Link |
| Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources | arXiv | 2022 | Link |
| Secret-Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels | arXiv | 2022 | Link |
| Secure & Private Federated Neuroimaging | arXiv | 2022 | Link |
| Secure Distributed Optimization Under Gradient Attacks | arXiv | 2022 | Link |
| Secure Intelligent Reflecting Surface Aided Integrated Sensing and Communication | arXiv | 2022 | Link |
| Secure Joint Communication and Sensing | arXiv | 2022 | Link |
| Secure and Private Source Coding with Private Key and Decoder Side Information | arXiv | 2022 | Link |
| Secure quantum dialogue via cavity QED | arXiv | 2022 | Link |
| Security of decoy-state quantum key distribution with correlated intensity fluctuations | arXiv | 2022 | Link |
| Semi-Private Computation of Data Similarity with Applications to Data Valuation and Pricing | arXiv | 2022 | Link |
| Semi-quantum dialogue based on single photons | arXiv | 2022 | Link |
| Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks | arXiv | 2022 | Link |
| Skellam Mixture Mechanism: a Novel Approach to Federated Learning with Differential Privacy | arXiv | 2022 | Link |
| Sketching for First Order Method: Efficient Algorithm for Low-Bandwidth Channel and Vulnerability | arXiv | 2022 | Link |
| Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated Learning | arXiv | 2022 | Link |
| SoK: Secure Human-centered Wireless Sensing | arXiv | 2022 | Link |
| Social Networks are Divulging Your Identity behind Crypto Addresses | arXiv | 2022 | Link |
| Social-Aware Clustered Federated Learning with Customized Privacy Preservation | arXiv | 2022 | Link |
| Sparse Dynamical Features generation, application to Parkinson's Disease diagnosis | arXiv | 2022 | Link |
| Split Learning without Local Weight Sharing to Enhance Client-side Data Privacy | arXiv | 2022 | Link |
| Split-U-Net: Preventing Data Leakage in Split Learning for Collaborative Multi-Modal Brain Tumor Segmentation | arXiv | 2022 | Link |
| SpyHammer: Understanding and Exploiting RowHammer under Fine-Grained Temperature Variations | arXiv | 2022 | Link |
| Strategic Coalition for Data Pricing in IoT Data Markets | arXiv | 2022 | Link |
| Strong Converse for Privacy Amplification against Quantum Side Information | arXiv | 2022 | Link |
| Structural Consensus in Networks with Directed Topologies and Its Cryptographic Implementation | arXiv | 2022 | Link |
| Subgraph Retrieval Enhanced Model for Multi-hop Knowledge Base Question Answering | arXiv | 2022 | Link |
| Survey on the Convergence of Machine Learning and Blockchain | arXiv | 2022 | Link |
| Swing Distillation: A Privacy-Preserving Knowledge Distillation Framework | arXiv | 2022 | Link |
| Synthetic Text Generation with Differential Privacy: A Simple and Practical Recipe | arXiv | 2022 | Link |
| Systematic Prevention of On-Core Timing Channels by Full Temporal Partitioning | arXiv | 2022 | Link |
| TIDF-DLPM: Term and Inverse Document Frequency based Data Leakage Prevention Model | arXiv | 2022 | Link |
| TOFU: Towards Obfuscated Federated Updates by Encoding Weight Updates into Gradients from Proxy Data | arXiv | 2022 | Link |
| TabLeak: Tabular Data Leakage in Federated Learning | arXiv | 2022 | Link |
| Take a Fresh Look at Recommender Systems from an Evaluation Standpoint | arXiv | 2022 | Link |
| Technical Report: Assisting Backdoor Federated Learning with Whole Population Knowledge Alignment | arXiv | 2022 | Link |
| Text Revealer: Private Text Reconstruction via Model Inversion Attacks against Transformers | arXiv | 2022 | Link |
| The Economics of Privacy and Utility: Investment Strategies | arXiv | 2022 | Link |
| The Privacy Onion Effect: Memorization is Relative | arXiv | 2022 | Link |
| Toward Secure and Private Over-the-Air Federated Learning | arXiv | 2022 | Link |
| Towards Privacy-Preserving, Real-Time and Lossless Feature Matching | arXiv | 2022 | Link |
| Towards learning to explain with concept bottleneck models: mitigating information leakage | arXiv | 2022 | Link |
| Trading Off Privacy, Utility and Efficiency in Federated Learning | arXiv | 2022 | Link |
| Trusted IP solution in multi-tenant cloud FPGA platform | arXiv | 2022 | Link |
| Turning a Curse into a Blessing: Enabling In-Distribution-Data-Free Backdoor Removal via Stabilized Model Inversion | arXiv | 2022 | Link |
| Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation | arXiv | 2022 | Link |
| Unsupervised Context Aware Sentence Representation Pretraining for Multi-lingual Dense Retrieval | arXiv | 2022 | Link |
| Unsupervised Graph Outlier Detection: Problem Revisit, New Insight, and Superior Method | arXiv | 2022 | Link |
| User-Level Differential Privacy against Attribute Inference Attack of Speech Emotion Recognition in Federated Learning | arXiv | 2022 | Link |
| Utility Assessment of Synthetic Data Generation Methods | arXiv | 2022 | Link |
| Variational Model Inversion Attacks | arXiv | 2022 | Link |
| Verifying Learning-Based Robotic Navigation Systems | arXiv | 2022 | Link |
| Vibration Compensation of Delta 3D Printer with Position-varying Dynamics using Filtered B-Splines | arXiv | 2022 | Link |
| Visual Concepts Tokenization | arXiv | 2022 | Link |
| Visual Transformer Meets CutMix for Improved Accuracy, Communication Efficiency, and Data Privacy in Split Learning | arXiv | 2022 | Link |
| VoicePrivacy 2022 System Description: Speaker Anonymization with Feature-matched F0 Trajectories | arXiv | 2022 | Link |
| When Digital Economy Meets Web3.0: Applications and Challenges | arXiv | 2022 | Link |
| White-box Inference Attacks against Centralized Machine Learning and Federated Learning | arXiv | 2022 | Link |
| Wireless Image Transmission with Semantic and Security Awareness | arXiv | 2022 | Link |
| You Are What You Write: Preserving Privacy in the Era of Large Language Models | arXiv | 2022 | Link |
| You Don't Know My Favorite Color: Preventing Dialogue Representations from Revealing Speakers' Private Personas | arXiv | 2022 | Link |
| Zero-Shot Machine Unlearning | arXiv | 2022 | Link |
| indic-punct: An automatic punctuation restoration and inverse text normalization framework for Indic languages | arXiv | 2022 | Link |
2021
| Title | Venue | Year | Link |
|---|---|---|---|
| "It's a Trap!"-How Speculation Invariance Can Be Abused with Forward Speculative Interference | arXiv | 2021 | Link |
| A Case Study of Intra-library Privacy Issues on Android GPS Navigation Apps | arXiv | 2021 | Link |
| A Communication-Efficient and Privacy-Aware Distributed Algorithm for Sparse PCA | arXiv | 2021 | Link |
| A Dispersed Federated Learning Framework for 6G-Enabled Autonomous Driving Cars | arXiv | 2021 | Link |
| A Federated Data-Driven Evolutionary Algorithm | arXiv | 2021 | Link |
| A Federated Learning Framework for Non-Intrusive Load Monitoring | arXiv | 2021 | Link |
| A Novel Data Encryption Method Inspired by Adversarial Attacks | arXiv | 2021 | Link |
| A Privacy-Preserving and Trustable Multi-agent Learning Framework | arXiv | 2021 | Link |
| A Quantitative Metric for Privacy Leakage in Federated Learning | arXiv | 2021 | Link |
| A Real-time Defense against Website Fingerprinting Attacks | arXiv | 2021 | Link |
| A Review of Confidentiality Threats Against Embedded Neural Network Models | arXiv | 2021 | Link |
| A Systematic Survey of Blockchained Federated Learning | arXiv | 2021 | Link |
| A Temporal Logic for Strategic Hyperproperties | arXiv | 2021 | Link |
| A fast algorithm for solving a three-dimensional inverse multiple frequency problems of scalar acoustics in a cylindrical region | arXiv | 2021 | Link |
| A methodology to identify identical single-board computers based on hardware behavior fingerprinting | arXiv | 2021 | Link |
| A new view of the solar interface region from the Interface Region Imaging Spectrograph (IRIS) | arXiv | 2021 | Link |
| A novel approach to reducing information leakage for quantum key distribution | arXiv | 2021 | Link |
| ADePT: Auto-encoder based Differentially Private Text Transformation | arXiv | 2021 | Link |
| AMPPERE: A Universal Abstract Machine for Privacy-Preserving Entity Resolution Evaluation | arXiv | 2021 | Link |
| APRIL: Finding the Achilles' Heel on Privacy for Vision Transformers | arXiv | 2021 | Link |
| Accelerating Parameter Extraction of Power MOSFET Models Using Automatic Differentiation | arXiv | 2021 | Link |
| Adaptive Modeling Against Adversarial Attacks | arXiv | 2021 | Link |
| Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning | arXiv | 2021 | Link |
| An Adversarial Transfer Network for Knowledge Representation Learning | arXiv | 2021 | Link |
| An Analysis Of Protected Health Information Leakage In Deep-Learning Based De-Identification Algorithms | arXiv | 2021 | Link |
| An Anonymous On-Street Parking Authentication Scheme via Zero-Knowledge Set Membership Proof | arXiv | 2021 | Link |
| An Attribute-Aligned Strategy for Learning Speech Representation | arXiv | 2021 | Link |
| An Efficient Learning Framework For Federated XGBoost Using Secret Sharing And Distributed Optimization | arXiv | 2021 | Link |
| An explainable two-dimensional single model deep learning approach for Alzheimer's disease diagnosis and brain atrophy localization | arXiv | 2021 | Link |
| Anonymization for Skeleton Action Recognition | arXiv | 2021 | Link |
| Asynchronous Federated Learning on Heterogeneous Devices: A Survey | arXiv | 2021 | Link |
| Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds | arXiv | 2021 | Link |
| Attribute Inference Attack of Speech Emotion Recognition in Federated Learning Settings | arXiv | 2021 | Link |
| Audiomer: A Convolutional Transformer For Keyword Spotting | arXiv | 2021 | Link |
| Augmenting Part-of-speech Tagging with Syntactic Information for Vietnamese and Chinese | arXiv | 2021 | Link |
| AutoFL: Enabling Heterogeneity-Aware Energy Efficient Federated Learning | arXiv | 2021 | Link |
| Automated Side Channel Analysis of Media Software with Manifold Learning | arXiv | 2021 | Link |
| Avaddon ransomware: an in-depth analysis and decryption of infected systems | arXiv | 2021 | Link |
| Batch Label Inference and Replacement Attacks in Black-Boxed Vertical Federated Learning | arXiv | 2021 | Link |
| Biometric Verification Secure Against Malicious Adversaries | arXiv | 2021 | Link |
| Biometrics: Trust, but Verify | arXiv | 2021 | Link |
| Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information | arXiv | 2021 | Link |
| Black-box Gradient Attack on Graph Neural Networks: Deeper Insights in Graph-based Attack and Defense | arXiv | 2021 | Link |
| Blockchain-based Transparency Framework for Privacy Preserving Third-party Services | arXiv | 2021 | Link |
| Bounding Information Leakage in Machine Learning | arXiv | 2021 | Link |
| Byzantine-Robust and Privacy-Preserving Framework for FedML | arXiv | 2021 | Link |
| Byzantine-robust Federated Learning through Spatial-temporal Analysis of Local Model Updates | arXiv | 2021 | Link |
| CAFE: Catastrophic Data Leakage in Vertical Federated Learning | arXiv | 2021 | Link |
| CAPE: Context-Aware Private Embeddings for Private Language Learning | arXiv | 2021 | Link |
| Causal-TGAN: Generating Tabular Data Using Causal Generative Adversarial Networks | arXiv | 2021 | Link |
| Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners | arXiv | 2021 | Link |
| CodedPaddedFL and CodedSecAgg: Straggler Mitigation and Secure Aggregation in Federated Learning | arXiv | 2021 | Link |
| Compositional Vulnerability Detection with Insecurity Separation Logic (Extended Version) | arXiv | 2021 | Link |
| Computation of COVID-19 epidemiological data in Hungary using dynamic model inversion | arXiv | 2021 | Link |
| Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets | arXiv | 2021 | Link |
| Configurable Privacy-Preserving Automatic Speech Recognition | arXiv | 2021 | Link |
| Construction of Differentially Private Summaries over Fully Homomorphic Encryption | arXiv | 2021 | Link |
| Contrastive Model Inversion for Data-Free Knowledge Distillation | arXiv | 2021 | Link |
| Creating Unbiased Public Benchmark Datasets with Data Leakage Prevention for Predictive Process Monitoring | arXiv | 2021 | Link |
| Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret | arXiv | 2021 | Link |
| DLPFS: The Data Leakage Prevention FileSystem | arXiv | 2021 | Link |
| DP-FP: Differentially Private Forward Propagation for Large Models | arXiv | 2021 | Link |
| DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning | arXiv | 2021 | Link |
| DTGAN: Differential Private Training for Tabular GANs | arXiv | 2021 | Link |
| Data Disclosure with Non-zero Leakage and Non-invertible Leakage Matrix | arXiv | 2021 | Link |
| Data Privacy and Utility Trade-Off Based on Mutual Information Neural Estimator | arXiv | 2021 | Link |
| Database Matching Under Column Deletions | arXiv | 2021 | Link |
| Decomposition of Global Feature Importance into Direct and Associative Components (DEDACT) | arXiv | 2021 | Link |
| Deep Gaussian Processes for Biogeophysical Parameter Retrieval and Model Inversion | arXiv | 2021 | Link |
| DeepAuditor: Distributed Online Intrusion Detection System for IoT devices via Power Side-channel Auditing | arXiv | 2021 | Link |
| DeepGroup: Representation Learning for Group Recommendation with Implicit Feedback | arXiv | 2021 | Link |
| DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories | arXiv | 2021 | Link |
| Demonstration of electron-nuclear decoupling at a spin clock transition | arXiv | 2021 | Link |
| Designing Counterfactual Generators using Deep Model Inversion | arXiv | 2021 | Link |
| Designing IRS-Aided MIMO Systems for Secrecy Enhancement | arXiv | 2021 | Link |
| DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning | arXiv | 2021 | Link |
| Differential Privacy Dynamics of Langevin Diffusion and Noisy Gradient Descent | arXiv | 2021 | Link |
| Differential Privacy in Cognitive Radio Networks: A Comprehensive Survey | arXiv | 2021 | Link |
| Differential Tracking Across Topical Webpages of Indian News Media | arXiv | 2021 | Link |
| Differentially Private Methods for Releasing Results of Stability Analyses | arXiv | 2021 | Link |
| Differentially private federated deep learning for multi-site medical image segmentation | arXiv | 2021 | Link |
| Discrete Distribution Estimation with Local Differential Privacy: A Comparative Analysis | arXiv | 2021 | Link |
| Do Not Let Privacy Overbill Utility: Gradient Embedding Perturbation for Private Learning | arXiv | 2021 | Link |
| Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting | arXiv | 2021 | Link |
| Edge Artificial Intelligence for 6G: Vision, Enabling Technologies, and Applications | arXiv | 2021 | Link |
| EdgeML: Towards Network-Accelerated Federated Learning over Wireless Edge | arXiv | 2021 | Link |
| Efficient CNN Building Blocks for Encrypted Data | arXiv | 2021 | Link |
| Efficient Recovery of a Shared Secret via Cooperation: Applications to SDMM and PIR | arXiv | 2021 | Link |
| Egocentric Image Captioning for Privacy-Preserved Passive Dietary Intake Monitoring | arXiv | 2021 | Link |
| Evaluating Multiple Guesses by an Adversary via a Tunable Loss Function | arXiv | 2021 | Link |
| Experimental Side Channel Analysis of BB84 QKD Source | arXiv | 2021 | Link |
| Exploiting Explanations for Model Inversion Attacks | arXiv | 2021 | Link |
| FED-$χ^2$: Privacy Preserving Federated Correlation Test | arXiv | 2021 | Link |
| FairCMS: Cloud Media Sharing with Fair Copyright Protection | arXiv | 2021 | Link |
| Fast-adapting and Privacy-preserving Federated Recommender System | arXiv | 2021 | Link |
| FedDAG: Federated DAG Structure Learning | arXiv | 2021 | Link |
| FedDPGAN: Federated Differentially Private Generative Adversarial Networks Framework for the Detection of COVID-19 Pneumonia | arXiv | 2021 | Link |
| FedGraph: Federated Graph Learning with Intelligent Sampling | arXiv | 2021 | Link |
| FedTriNet: A Pseudo Labeling Method with Three Players for Federated Semi-supervised Learning | arXiv | 2021 | Link |
| Federated Deep Learning with Bayesian Privacy | arXiv | 2021 | Link |
| Federated Learning Over Wireless Channels: Dynamic Resource Allocation and Task Scheduling | arXiv | 2021 | Link |
| Federated Learning for Face Recognition with Gradient Correction | arXiv | 2021 | Link |
| Federated Multi-View Learning for Private Medical Data Integration and Analysis | arXiv | 2021 | Link |
| Federated Traffic Synthesizing and Classification Using Generative Adversarial Networks | arXiv | 2021 | Link |
| Federated Two-stage Learning with Sign-based Voting | arXiv | 2021 | Link |
| Floquet-Mode Traveling-Wave Parametric Amplifiers | arXiv | 2021 | Link |
| GF-Flush: A GF(2) Algebraic Attack on Secure Scan Chains | arXiv | 2021 | Link |
| GL-GIN: Fast and Accurate Non-Autoregressive Model for Joint Multiple Intent Detection and Slot Filling | arXiv | 2021 | Link |
| GRNN: Generative Regression Neural Network -- A Data Leakage Attack for Federated Learning | arXiv | 2021 | Link |
| Generalization Bounds for Stochastic Gradient Langevin Dynamics: A Unified View via Information Leakage Analysis | arXiv | 2021 | Link |
| Generative Adversarial U-Net for Domain-free Medical Image Augmentation | arXiv | 2021 | Link |
| Gradient Inversion with Generative Image Prior | arXiv | 2021 | Link |
| Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning | arXiv | 2021 | Link |
| GraphMI: Extracting Private Graph Data from Graph Neural Networks | arXiv | 2021 | Link |
| Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable Quantum Key Distribution with High Excess Noise Tolerance | arXiv | 2021 | Link |
| HyObscure: Hybrid Obscuring for Privacy-Preserving Data Publishing | arXiv | 2021 | Link |
| Hybrid Systems, Iterative Learning Control, and Non-minimum Phase | arXiv | 2021 | Link |
| HyperGI: Automated Detection and Repair of Information Flow Leakage | arXiv | 2021 | Link |
| Hyperparameter Tuning with Renyi Differential Privacy | arXiv | 2021 | Link |
| IMAGINE: Image Synthesis by Image-Guided Model Inversion | arXiv | 2021 | Link |
| Improve Unscented Kalman Inversion With Low-Rank Approximation and Reduced-Order Model | arXiv | 2021 | Link |
| Inference Attacks Against Graph Neural Networks | arXiv | 2021 | Link |
| Information Leakage in Zero-Error Source Coding: A Graph-Theoretic Perspective | arXiv | 2021 | Link |
| Information Theoretic Evaluation of Privacy-Leakage, Interpretability, and Transferability for Trustworthy AI | arXiv | 2021 | Link |
| Information flow based defensive chain for data leakage detection and prevention: a survey | arXiv | 2021 | Link |
| Innovative Electroacoustic resonator Control enforcing Duffing dynamics at moderate excitation levels: conception and experimental validation | arXiv | 2021 | Link |
| Inverse patchy colloids: synthesis, modeling and self-organization | arXiv | 2021 | Link |
| Inverting brain grey matter models with likelihood-free inference: a tool for trustable cytoarchitecture measurements | arXiv | 2021 | Link |
| Investigating Protected Health Information Leakage from Android Medical Applications | arXiv | 2021 | Link |
| Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs | arXiv | 2021 | Link |
| Large Scale Private Learning via Low-rank Reparametrization | arXiv | 2021 | Link |
| Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels -- Attacks and Defenses | arXiv | 2021 | Link |
| Learner-Private Convex Optimization | arXiv | 2021 | Link |
| Learning Sparse Privacy-Preserving Representations for Smart Meters Data | arXiv | 2021 | Link |
| Less is More: Lighter and Faster Deep Neural Architecture for Tomato Leaf Disease Classification | arXiv | 2021 | Link |
| Leveraging User Behavior History for Personalized Email Search | arXiv | 2021 | Link |
| Lifting The Grey Curtain: A First Look at the Ecosystem of CULPRITWARE | arXiv | 2021 | Link |
| Linear Prediction Residual for Efficient Diagnosis of Parkinson's Disease from Gait | arXiv | 2021 | Link |
| LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis | arXiv | 2021 | Link |
| LoSAC: An Efficient Local Stochastic Average Control Method for Federated Optimization | arXiv | 2021 | Link |
| Lower Bounds for the MMSE via Neural Network Estimation and Their Applications to Privacy | arXiv | 2021 | Link |
| ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models | arXiv | 2021 | Link |
| Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey | arXiv | 2021 | Link |
| Machine unlearning via GAN | arXiv | 2021 | Link |
| Managing dataset shift by adversarial validation for credit scoring | arXiv | 2021 | Link |
| Measurement device-independent quantum key distribution with passive, time-dependent source side-channels | arXiv | 2021 | Link |
| Measuring Data Leakage in Machine-Learning Models with Fisher Information | arXiv | 2021 | Link |
| Measuring Information Leakage in Non-stochastic Brute-Force Guessing | arXiv | 2021 | Link |
| Membership Inference Attack Susceptibility of Clinical Language Models | arXiv | 2021 | Link |
| Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning | arXiv | 2021 | Link |
| Membership Inference Attacks Against Recommender Systems | arXiv | 2021 | Link |
| Membership Inference Attacks Against Self-supervised Speech Models | arXiv | 2021 | Link |
| Membership Inference Attacks Against Temporally Correlated Data in Deep Reinforcement Learning | arXiv | 2021 | Link |
| Membership Inference Attacks on Knowledge Graphs | arXiv | 2021 | Link |
| Membership Inference on Word Embedding and Beyond | arXiv | 2021 | Link |
| Memorization vs. Generalization: Quantifying Data Leakage in NLP Performance Evaluation | arXiv | 2021 | Link |
| Minimization of information leakage in continuous-variable quantum key distribution | arXiv | 2021 | Link |
| Minimizing Information Leakage of Abrupt Changes in Stochastic Systems | arXiv | 2021 | Link |
| Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture | arXiv | 2021 | Link |
| Mitigating Power Attacks through Fine-Grained Instruction Reordering | arXiv | 2021 | Link |
| MixNN: Protection of Federated Learning Against Inference Attacks by Mixing Neural Network Layers | arXiv | 2021 | Link |
| MuCoMiD: A Multitask Convolutional Learning Framework for miRNA-Disease Association Prediction | arXiv | 2021 | Link |
| Multi-Party Dual Learning | arXiv | 2021 | Link |
| Multi-Trigger-Key: Towards Multi-Task Privacy Preserving In Deep Learning | arXiv | 2021 | Link |
| Multitask Identity-Aware Image Steganography via Minimax Optimization | arXiv | 2021 | Link |
| Non-autoregressive Transformer with Unified Bidirectional Decoder for Automatic Speech Recognition | arXiv | 2021 | Link |
| Non-equilibrium plasma generation via nano-second multi-mode laser pulses | arXiv | 2021 | Link |
| OGGN: A Novel Generalized Oracle Guided Generative Architecture for Modelling Inverse Function of Artificial Neural Networks | arXiv | 2021 | Link |
| On performance of PBFT for IoT-applications with constrained devices | arXiv | 2021 | Link |
| On the Importance of Encrypting Deep Features | arXiv | 2021 | Link |
| On the Robustness of Vision Transformers to Adversarial Examples | arXiv | 2021 | Link |
| On the differential privacy of dynamic location obfuscation with personalized error bounds | arXiv | 2021 | Link |
| On the privacy-utility trade-off in differentially private hierarchical text classification | arXiv | 2021 | Link |
| Optimal Rate-Distortion-Leakage Tradeoff for Single-Server Information Retrieval | arXiv | 2021 | Link |
| Optimal anticodes, MSRD codes, and generalized weights in the sum-rank metric | arXiv | 2021 | Link |
| P4AI: Approaching AI Ethics through Principlism | arXiv | 2021 | Link |
| PASS: Protected Attribute Suppression System for Mitigating Bias in Face Recognition | arXiv | 2021 | Link |
| PIVODL: Privacy-preserving vertical federated learning over distributed labels | arXiv | 2021 | Link |
| PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments | arXiv | 2021 | Link |
| PRECODE - A Generic Model Extension to Prevent Deep Gradient Leakage | arXiv | 2021 | Link |
| Persuasion and Welfare | arXiv | 2021 | Link |
| PnPOOD : Out-Of-Distribution Detection for Text Classification via Plug andPlay Data Augmentation | arXiv | 2021 | Link |
| Practical Defences Against Model Inversion Attacks for Split Neural Networks | arXiv | 2021 | Link |
| Preserving Privacy in Personalized Models for Distributed Mobile Services | arXiv | 2021 | Link |
| Privacy Amplification for Federated Learning via User Sampling and Wireless Aggregation | arXiv | 2021 | Link |
| Privacy Budget Scheduling | arXiv | 2021 | Link |
| Privacy Information Classification: A Hybrid Approach | arXiv | 2021 | Link |
| Privacy Leakage over Dependent Attributes in One-Sided Differential Privacy | arXiv | 2021 | Link |
| Privacy Vulnerability of Split Computing to Data-Free Model Inversion Attacks | arXiv | 2021 | Link |
| Privacy-Preserving Database Fingerprinting | arXiv | 2021 | Link |
| Privacy-Preserving Federated Learning on Partitioned Attributes | arXiv | 2021 | Link |
| Privacy-Preserving Machine Learning: Methods, Challenges and Directions | arXiv | 2021 | Link |
| Privacy-Preserving Transactive Energy Management for IoT-aided Smart Homes via Blockchain | arXiv | 2021 | Link |
| Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies | arXiv | 2021 | Link |
| Privacy-Utility Trade-Offs Against Limited Adversaries | arXiv | 2021 | Link |
| Privacy-preserving Federated Learning based on Multi-key Homomorphic Encryption | arXiv | 2021 | Link |
| PrivateSNN: Privacy-Preserving Spiking Neural Networks | arXiv | 2021 | Link |
| Promises and Pitfalls of Black-Box Concept Learning Models | arXiv | 2021 | Link |
| Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model's Complexity | arXiv | 2021 | Link |
| Property Inference From Poisoning | arXiv | 2021 | Link |
| Protect Against Unintentional Insider Threats: The risk of an employee's cyber misconduct on a Social Media Site | arXiv | 2021 | Link |
| Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation | arXiv | 2021 | Link |
| QFlow: Quantitative Information Flow for Security-Aware Hardware Design in Verilog | arXiv | 2021 | Link |
| Quality of Service Guarantees for Physical Unclonable Functions | arXiv | 2021 | Link |
| Quantifying and Localizing Usable Information Leakage from Neural Network Gradients | arXiv | 2021 | Link |
| Quantifying identifiability to choose and audit $ε$ in differentially private deep learning | arXiv | 2021 | Link |
| Quantum federated learning through blind quantum computing | arXiv | 2021 | Link |
| Quantum secure direct communication with private dense coding using general preshared quantum state | arXiv | 2021 | Link |
| Qubit Sensing: A New Attack Model for Multi-programming Quantum Computing | arXiv | 2021 | Link |
| Random Hash Code Generation for Cancelable Fingerprint Templates using Vector Permutation and Shift-order Process | arXiv | 2021 | Link |
| Random vector functional link neural network based ensemble deep learning for short-term load forecasting | arXiv | 2021 | Link |
| Reconfigurable Intelligent Surface Empowered Over-the-Air Federated Edge Learning | arXiv | 2021 | Link |
| Reconstructing Training Data from Diverse ML Models by Ensemble Inversion | arXiv | 2021 | Link |
| Recurrent Neural Network-based Internal Model Control design for stable nonlinear systems | arXiv | 2021 | Link |
| Reinforcement Learning on Encrypted Data | arXiv | 2021 | Link |
| Resource Allocation for IRS-Enabled Secure Multiuser Multi-Carrier Downlink URLLC Systems | arXiv | 2021 | Link |
| Revisiting Challenges for Selective Data Protection of Real Applications | arXiv | 2021 | Link |
| Revizor: Testing Black-box CPUs against Speculation Contracts | arXiv | 2021 | Link |
| Robot Program Parameter Inference via Differentiable Shadow Program Inversion | arXiv | 2021 | Link |
| Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video | arXiv | 2021 | Link |
| Robust and Information-theoretically Safe Bias Classifier against Adversarial Attacks | arXiv | 2021 | Link |
| Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey | arXiv | 2021 | Link |
| Round-robin differential phase-time-shifting protocol for quantum key distribution: theory and experiment | arXiv | 2021 | Link |
| SASH: Efficient Secure Aggregation Based on SHPRG For Federated Learning | arXiv | 2021 | Link |
| SGDE: Secure Generative Data Exchange for Cross-Silo Federated Learning | arXiv | 2021 | Link |
| Secrecy: Secure collaborative analytics on secret-shared data | arXiv | 2021 | Link |
| Secure Bilevel Asynchronous Vertical Federated Learning with Backward Updating | arXiv | 2021 | Link |
| Secure Block Source Coding with Sequential Encoding | arXiv | 2021 | Link |
| Secure Machine Learning over Relational Data | arXiv | 2021 | Link |
| Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT Systems | arXiv | 2021 | Link |
| Secure Multi-Party Quantum Conference and Xor Computation | arXiv | 2021 | Link |
| Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning | arXiv | 2021 | Link |
| Security Analysis and Improvement of Source Independent Quantum Random Number Generators with Imperfect Devices | arXiv | 2021 | Link |
| Separation of Powers in Federated Learning | arXiv | 2021 | Link |
| Sharing FANCI Features: A Privacy Analysis of Feature Extraction for DGA Detection | arXiv | 2021 | Link |
| Simple and loss-tolerant free-space QKD using a squeezed laser | arXiv | 2021 | Link |
| Smoothed Differential Privacy | arXiv | 2021 | Link |
| SoK: Privacy-Preserving Collaborative Tree-based Model Learning | arXiv | 2021 | Link |
| Subverting Stateful Firewalls with Protocol States (Extended Version) | arXiv | 2021 | Link |
| Survey: Leakage and Privacy at Inference Time | arXiv | 2021 | Link |
| TAG: Gradient Attack on Transformer-based Language Models | arXiv | 2021 | Link |
| TOHAN: A One-step Approach towards Few-shot Hypothesis Adaptation | arXiv | 2021 | Link |
| The Controllability of Planning, Responsibility, and Security in Automatic Driving Technology | arXiv | 2021 | Link |
| The Curse of Correlations for Robust Fingerprinting of Relational Databases | arXiv | 2021 | Link |
| The Image Local Autoregressive Transformer | arXiv | 2021 | Link |
| The Privacy Paradox and Optimal Bias-Variance Trade-offs in Data Acquisition | arXiv | 2021 | Link |
| The Stackelberg Equilibrium for One-sided Zero-sum Partially Observable Stochastic Games | arXiv | 2021 | Link |
| The Surprising Performance of Simple Baselines for Misinformation Detection | arXiv | 2021 | Link |
| Timing Covert Channel Analysis of the VxWorks MILS Embedded Hypervisor under the Common Criteria Security Certification | arXiv | 2021 | Link |
| Towards General-purpose Infrastructure for Protecting Scientific Data Under Study | arXiv | 2021 | Link |
| Towards Industrial Private AI: A two-tier framework for data and model security | arXiv | 2021 | Link |
| Towards Secure and Practical Machine Learning via Secret Sharing and Random Permutation | arXiv | 2021 | Link |
| Training Data Leakage Analysis in Language Models | arXiv | 2021 | Link |
| UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning | arXiv | 2021 | Link |
| Unbiased Statistical Estimation and Valid Confidence Intervals Under Differential Privacy | arXiv | 2021 | Link |
| Understanding Training-Data Leakage from Gradients in Neural Networks for Image Classification | arXiv | 2021 | Link |
| Understanding and Mitigating Banking Trojans: From Zeus to Emotet | arXiv | 2021 | Link |
| Unsupervised Information Obfuscation for Split Inference of Neural Networks | arXiv | 2021 | Link |
| Variational Leakage: The Role of Information Complexity in Privacy Leakage | arXiv | 2021 | Link |
| Wavefront tolerances of space-based segmented telescopes at very high contrast: Experimental validation | arXiv | 2021 | Link |
| Weakly Private Information Retrieval Under Rényi Divergence | arXiv | 2021 | Link |
| What Remains of Visual Semantic Embeddings | arXiv | 2021 | Link |
| When the Curious Abandon Honesty: Federated Learning Is Not Private | arXiv | 2021 | Link |
| Wireless Charging Power Side-Channel Attacks | arXiv | 2021 | Link |
| Wireless Federated Learning over MIMO Networks: Joint Device Scheduling and Beamforming Design | arXiv | 2021 | Link |
| Wiretap Secret Key Agreement Via Secure Omniscience | arXiv | 2021 | Link |
| Y-GAN: Learning Dual Data Representations for Efficient Anomaly Detection | arXiv | 2021 | Link |
2020
| Title | Venue | Year | Link |
|---|---|---|---|
| $μ$Tiles: Efficient Intra-Process Privilege Enforcement of Memory Regions | arXiv | 2020 | Link |
| A Compiler Assisted Scheduler for Detecting and Mitigating Cache-Based Side Channel Attacks | arXiv | 2020 | Link |
| A Comprehensive Analysis of Information Leakage in Deep Transfer Learning | arXiv | 2020 | Link |
| A Critical Study on Data Leakage in Recommender System Offline Evaluation | arXiv | 2020 | Link |
| A Framework for Evaluating Gradient Leakage Attacks in Federated Learning | arXiv | 2020 | Link |
| A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment | arXiv | 2020 | Link |
| A Graph Symmetrisation Bound on Channel Information Leakage under Blowfish Privacy | arXiv | 2020 | Link |
| A Novel Privacy-Preserved Recommender System Framework based on Federated Learning | arXiv | 2020 | Link |
| A Polynomial Interpolation based Quantum Key Reconciliation Protocol: Error Correction without Information Leakage | arXiv | 2020 | Link |
| A Secure Federated Learning Framework for 5G Networks | arXiv | 2020 | Link |
| A Visualization Interface to Improve the Transparency of Collected Personal Data on the Internet | arXiv | 2020 | Link |
| A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems | arXiv | 2020 | Link |
| A connection between bacterial chemotactic network and optimal filtering | arXiv | 2020 | Link |
| Accounting for Input Noise in Gaussian Process Parameter Retrieval | arXiv | 2020 | Link |
| Additively Homomorphical Encryption based Deep Neural Network for Asymmetrically Collaborative Machine Learning | arXiv | 2020 | Link |
| Adversarial Data Encryption | arXiv | 2020 | Link |
| Against Membership Inference Attack: Pruning is All You Need | arXiv | 2020 | Link |
| Amnesiac Machine Learning | arXiv | 2020 | Link |
| An Approach for the Identification of Information Leakage in Automotive Infotainment systems | arXiv | 2020 | Link |
| An Efficiency-boosting Client Selection Scheme for Federated Learning with Fairness Guarantee | arXiv | 2020 | Link |
| An Overview of Privacy in Machine Learning | arXiv | 2020 | Link |
| Analysing Flow Security Properties in Virtualised Computing Systems | arXiv | 2020 | Link |
| Anomalous waves triggered by abrupt depth changes: laboratory experiments and truncated KdV statistical mechanics | arXiv | 2020 | Link |
| Another Look at Privacy-Preserving Automated Contact Tracing | arXiv | 2020 | Link |
| Asymmetric Leaky Private Information Retrieval | arXiv | 2020 | Link |
| Backflashes in fast-gated avalanche photodiodes in quantum key distribution | arXiv | 2020 | Link |
| Bayesian model inversion using stochastic spectral embedding | arXiv | 2020 | Link |
| Biometric Identification Systems With Noisy Enrollment for Gaussian Source | arXiv | 2020 | Link |
| Black holes as clouded mirrors: the Hayden-Preskill protocol with symmetry | arXiv | 2020 | Link |
| Black-box Model Inversion Attribute Inference Attacks on Classification Models | arXiv | 2020 | Link |
| Blockchain-Empowered Socially Optimal Transactive Energy System: Framework and Implementation | arXiv | 2020 | Link |
| Bounding Privacy Leakage in Smart Buildings | arXiv | 2020 | Link |
| Bridging the Performance Gap between FGSM and PGD Adversarial Training | arXiv | 2020 | Link |
| Building and Maintaining a Third-Party Library Supply Chain for Productive and Secure SGX Enclave Development | arXiv | 2020 | Link |
| Can Two Walk Together: Privacy Enhancing Methods and Preventing Tracking of Users | arXiv | 2020 | Link |
| Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? | arXiv | 2020 | Link |
| CenterYou: A cloud-based Approach to Simplify Android Privacy Management | arXiv | 2020 | Link |
| Channel Leakage, Information-Theoretic Limitations of Obfuscation, and Optimal Privacy Mask Design for Streaming Data | arXiv | 2020 | Link |
| Collusion-Resilient Probabilistic Fingerprinting Scheme for Correlated Data | arXiv | 2020 | Link |
| Comment on "No-Reference Video Quality Assessment Based on the Temporal Pooling of Deep Features" | arXiv | 2020 | Link |
| Communication-Efficient Federated Learning with Compensated Overlap-FedAvg | arXiv | 2020 | Link |
| Communication-Efficient Multimodal Split Learning for mmWave Received Power Prediction | arXiv | 2020 | Link |
| Concentrated Differentially Private and Utility Preserving Federated Learning | arXiv | 2020 | Link |
| Corella: A Private Multi Server Learning Approach based on Correlated Queries | arXiv | 2020 | Link |
| Correlated Data in Differential Privacy: Definition and Analysis | arXiv | 2020 | Link |
| Correlated Differential Privacy: Feature Selection in Machine Learning | arXiv | 2020 | Link |
| Correlated daily time series and forecasting in the M4 competition | arXiv | 2020 | Link |
| Countermeasure against quantum hacking using detection statistics | arXiv | 2020 | Link |
| Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks | arXiv | 2020 | Link |
| Critical analysis on the reproducibility of visual quality assessment using deep features | arXiv | 2020 | Link |
| Critical faults of leakage errors on the surface code | arXiv | 2020 | Link |
| Cross-Layer Deanonymization Methods in the Lightning Protocol | arXiv | 2020 | Link |
| DPoS: Decentralized, Privacy-Preserving, and Low-Complexity Online Slicing for Multi-Tenant Networks | arXiv | 2020 | Link |
| DarKnight: A Data Privacy Scheme for Training and Inference of Deep Neural Networks | arXiv | 2020 | Link |
| Data Sanitisation Protocols for the Privacy Funnel with Differential Privacy Guarantees | arXiv | 2020 | Link |
| Decentralizing Feature Extraction with Quantum Convolutional Neural Network for Automatic Speech Recognition | arXiv | 2020 | Link |
| Deep Importance Sampling based on Regression for Model Inversion and Emulation | arXiv | 2020 | Link |
| Defending Model Inversion and Membership Inference Attacks via Prediction Purification | arXiv | 2020 | Link |
| Differentially Private Online Submodular Maximization | arXiv | 2020 | Link |
| Differentially Private Representation for NLP: Formal Guarantee and An Empirical Study on Privacy and Fairness | arXiv | 2020 | Link |
| Direct phase modulation via optical injection: theoretical study | arXiv | 2020 | Link |
| Dynamic Skyline Queries on Encrypted Data Using Result Materialization | arXiv | 2020 | Link |
| Dynamic causal modelling of COVID-19 | arXiv | 2020 | Link |
| Erratum Concerning the Obfuscated Gradients Attack on Stochastic Activation Pruning | arXiv | 2020 | Link |
| Estimating g-Leakage via Machine Learning | arXiv | 2020 | Link |
| Estimating required 'lockdown' cycles before immunity to SARS-CoV-2: Model-based analyses of susceptible population sizes, 'S0', in seven European countries including the UK and Ireland | arXiv | 2020 | Link |
| Evaluation of Inference Attack Models for Deep Learning on Medical Data | arXiv | 2020 | Link |
| FaceLeaks: Inference Attacks against Transfer Learning Models via Black-box Queries | arXiv | 2020 | Link |
| Fault Attacks on Secure Embedded Software: Threats, Design and Evaluation | arXiv | 2020 | Link |
| Fault Tolerant Control of Multirotor UAV for Piloted Outdoor Flights | arXiv | 2020 | Link |
| Fault tolerant quantum data locking | arXiv | 2020 | Link |
| Feature Inference Attack on Model Predictions in Vertical Federated Learning | arXiv | 2020 | Link |
| FedSel: Federated SGD under Local Differential Privacy with Top-k Dimension Selection | arXiv | 2020 | Link |
| Federated Learning for Resource-Constrained IoT Devices: Panoramas and State-of-the-art | arXiv | 2020 | Link |
| Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning | arXiv | 2020 | Link |
| Free Gap Estimates from the Exponential Mechanism, Sparse Vector, Noisy Max and Related Algorithms | arXiv | 2020 | Link |
| Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval | arXiv | 2020 | Link |
| Giving Semantics to Program-Counter Labels via Secure Effects | arXiv | 2020 | Link |
| Green Lighting ML: Confidentiality, Integrity, and Availability of Machine Learning Systems in Deployment | arXiv | 2020 | Link |
| Guidelines for Implementing and Auditing Differentially Private Systems | arXiv | 2020 | Link |
| Harnessing Wireless Channels for Scalable and Privacy-Preserving Federated Learning | arXiv | 2020 | Link |
| Hermes Attack: Steal DNN Models with Lossless Inference Accuracy | arXiv | 2020 | Link |
| High-resolution spectroscopy of a surge in an emerging flux region | arXiv | 2020 | Link |
| How Does Data Augmentation Affect Privacy in Machine Learning? | arXiv | 2020 | Link |
| How to 0wn NAS in Your Spare Time | arXiv | 2020 | Link |
| IRO: Integrity and Reliability Enhanced Ring ORAM | arXiv | 2020 | Link |
| Image Restoration from Parametric Transformations using Generative Models | arXiv | 2020 | Link |
| Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection | arXiv | 2020 | Link |
| Improving Robustness to Model Inversion Attacks via Mutual Information Regularization | arXiv | 2020 | Link |
| Improving the Security of "Measurement-Device-Independent Quantum Communication without Encryption" | arXiv | 2020 | Link |
| Information Laundering for Model Privacy | arXiv | 2020 | Link |
| Information Leakage Games: Exploring Information as a Utility Function | arXiv | 2020 | Link |
| Information Leakage in Embedding Models | arXiv | 2020 | Link |
| Information Obfuscation of Graph Neural Networks | arXiv | 2020 | Link |
| Information-Theoretic Bounds on the Generalization Error and Privacy Leakage in Federated Learning | arXiv | 2020 | Link |
| KART: Parameterization of Privacy Leakage Scenarios from Pre-trained Language Models | arXiv | 2020 | Link |
| Knowledge-Enriched Distributional Model Inversion Attacks | arXiv | 2020 | Link |
| Label-Only Membership Inference Attacks | arXiv | 2020 | Link |
| Latent-variable Private Information Retrieval | arXiv | 2020 | Link |
| Layer-wise Characterization of Latent Information Leakage in Federated Learning | arXiv | 2020 | Link |
| Leakage detection for a transmon-based surface code | arXiv | 2020 | Link |
| Leaking Sensitive Financial Accounting Data in Plain Sight using Deep Autoencoder Neural Networks | arXiv | 2020 | Link |
| Learning for Advanced Motion Control | arXiv | 2020 | Link |
| Learning to drive via Apprenticeship Learning and Deep Reinforcement Learning | arXiv | 2020 | Link |
| Learning, compression, and leakage: Minimising classification error via meta-universal compression principles | arXiv | 2020 | Link |
| Legal Risks of Adversarial Machine Learning Research | arXiv | 2020 | Link |
| LiteDenseNet: A Lightweight Network for Hyperspectral Image Classification | arXiv | 2020 | Link |
| MGA: Momentum Gradient Attack on Network | arXiv | 2020 | Link |
| Machine Learning Interpretability Meets TLS Fingerprinting | arXiv | 2020 | Link |
| Measurement-Device-Independent Quantum Key Distribution with Leaky Sources | arXiv | 2020 | Link |
| Measuring Information Leakage in Non-stochastic Brute-Force Guessing | arXiv | 2020 | Link |
| Mechanisms for Hiding Sensitive Genotypes with Information-Theoretic Privacy | arXiv | 2020 | Link |
| MixCon: Adjusting the Separability of Data Representations for Harder Data Recovery | arXiv | 2020 | Link |
| Modelling and Quantifying Membership Information Leakage in Machine Learning | arXiv | 2020 | Link |
| Monte Carlo Estimators for the Schatten p-norm of Symmetric Positive Semidefinite Matrices | arXiv | 2020 | Link |
| Multi-Entity and Multi-Enrollment Key Agreement with Correlated Noise | arXiv | 2020 | Link |
| Multi-Server Weakly-Private Information Retrieval | arXiv | 2020 | Link |
| Multiple Classification with Split Learning | arXiv | 2020 | Link |
| Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks | arXiv | 2020 | Link |
| NoPeek: Information leakage reduction to share activations in distributed deep learning | arXiv | 2020 | Link |
| On Primes, Log-Loss Scores and (No) Privacy | arXiv | 2020 | Link |
| On Properties and Optimization of Information-theoretic Privacy Watchdog | arXiv | 2020 | Link |
| On the Effectiveness of Regularization Against Membership Inference Attacks | arXiv | 2020 | Link |
| On the Information Leakage of Camera Fingerprint Estimates | arXiv | 2020 | Link |
| On the Privacy Risks of Algorithmic Fairness | arXiv | 2020 | Link |
| Opacity of Discrete Event Systems with Active Intruder | arXiv | 2020 | Link |
| Optimizing Resource-Efficiency for Federated Edge Intelligence in IoT Networks | arXiv | 2020 | Link |
| Over-the-Air Membership Inference Attacks as Privacy Threats for Deep Learning-based Wireless Signal Classifiers | arXiv | 2020 | Link |
| PASCAL: Timing SCA Resistant Design and Verification Flow | arXiv | 2020 | Link |
| PROSPECT-PRO for estimating content of nitrogen-containing leaf proteins and other carbon-based constituents | arXiv | 2020 | Link |
| Parametric Instance Classification for Unsupervised Visual Feature Learning | arXiv | 2020 | Link |
| Performance Optimization on Practical Quantum Random Number Generators: Modification on Min-entropy Evaluation and Acceleration on Post Processing | arXiv | 2020 | Link |
| Personalized Federated Learning for Intelligent IoT Applications: A Cloud-Edge based Framework | arXiv | 2020 | Link |
| Politics of Adversarial Machine Learning | arXiv | 2020 | Link |
| Practical Privacy Attacks on Vertical Federated Learning | arXiv | 2020 | Link |
| Preference-Based Privacy Trading | arXiv | 2020 | Link |
| Prevention of Microarchitectural Covert Channels on an Open-Source 64-bit RISC-V Core | arXiv | 2020 | Link |
| Prioritized Multi-Criteria Federated Learning | arXiv | 2020 | Link |
| PrivNet: Safeguarding Private Attributes in Transfer Learning for Recommendation | arXiv | 2020 | Link |
| Privacy Guidelines for Contact Tracing Applications | arXiv | 2020 | Link |
| Privacy Leakage of SIFT Features via Deep Generative Model based Image Reconstruction | arXiv | 2020 | Link |
| Privacy Preservation in Federated Learning: An insightful survey from the GDPR Perspective | arXiv | 2020 | Link |
| Privacy Preserving Visual SLAM | arXiv | 2020 | Link |
| Privacy Preserving in Non-Intrusive Load Monitoring: A Differential Privacy Perspective | arXiv | 2020 | Link |
| Privacy Protection via Joint Real and Reactive Load Shaping in Smart Grids | arXiv | 2020 | Link |
| Privacy-Aware Time-Series Data Sharing with Deep Reinforcement Learning | arXiv | 2020 | Link |
| Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms | arXiv | 2020 | Link |
| Privacy-Preserving Distributed Projection LMS for Linear Multitask Networks | arXiv | 2020 | Link |
| Privacy-Preserving Distributed Zeroth-Order Optimization | arXiv | 2020 | Link |
| Privacy-Preserving Dynamic Personalized Pricing with Demand Learning | arXiv | 2020 | Link |
| Privacy-Preserving Policy Synthesis in Markov Decision Processes | arXiv | 2020 | Link |
| Privacy-aware Data Trading | arXiv | 2020 | Link |
| Privacy-preserving Decentralized Aggregation for Federated Learning | arXiv | 2020 | Link |
| Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata | arXiv | 2020 | Link |
| Privacy-preserving Transfer Learning via Secure Maximum Mean Discrepancy | arXiv | 2020 | Link |
| Privacy-preserving medical image analysis | arXiv | 2020 | Link |
| Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis | arXiv | 2020 | Link |
| Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective | arXiv | 2020 | Link |
| Quantifying Membership Privacy via Information Leakage | arXiv | 2020 | Link |
| Quantifying Privacy Leakage in Graph Embedding | arXiv | 2020 | Link |
| R-GAP: Recursive Gradient Attack on Privacy | arXiv | 2020 | Link |
| RDP-GAN: A Rényi-Differential Privacy based Generative Adversarial Network | arXiv | 2020 | Link |
| Realistic Re-evaluation of Knowledge Graph Completion Methods: An Experimental Study | arXiv | 2020 | Link |
| Reducing Risk of Model Inversion Using Privacy-Guided Training | arXiv | 2020 | Link |
| Reduction Theorem for Secrecy over Linear Network Code for Active Attacks | arXiv | 2020 | Link |
| Resilient Collaborative Privacy for Location-Based Services | arXiv | 2020 | Link |
| Resilient Privacy Protection for Location-Based Services through Decentralization | arXiv | 2020 | Link |
| Resource Allocation for Secure Multi-User Downlink MISO-URLLC Systems | arXiv | 2020 | Link |
| Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions | arXiv | 2020 | Link |
| Robust Privatization with Multiple Tasks and the Optimal Privacy-Utility Tradeoff | arXiv | 2020 | Link |
| RobustBench: a standardized adversarial robustness benchmark | arXiv | 2020 | Link |
| SIMF: Single-Instruction Multiple-Flush Mechanism for Processor Temporal Isolation | arXiv | 2020 | Link |
| SMAP: A Joint Dimensionality Reduction Scheme for Secure Multi-Party Visualization | arXiv | 2020 | Link |
| SPChain: Blockchain-based Medical Data Sharing and Privacy-preserving eHealth System | arXiv | 2020 | Link |
| STAN: Synthetic Network Traffic Generation with Generative Neural Models | arXiv | 2020 | Link |
| Sanitizing Synthetic Training Data Generation for Question Answering over Knowledge Graphs | arXiv | 2020 | Link |
| SecEL: Privacy-Preserving, Verifiable and Fault-Tolerant Edge Learning for Autonomous Vehicles | arXiv | 2020 | Link |
| Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary | arXiv | 2020 | Link |
| Secure Non-Orthogonal Multiple Access: An Interference Engineering Perspective | arXiv | 2020 | Link |
| Secure Simultaneous Information and Power Transfer for Downlink Multi-user Massive MIMO | arXiv | 2020 | Link |
| Secure and Fault Tolerant Decentralized Learning | arXiv | 2020 | Link |
| Secure and Reliable Key Agreement with Physical Unclonable Functions | arXiv | 2020 | Link |
| Secure network code over one-hop relay network | arXiv | 2020 | Link |
| Semantic, Efficient, and Secure Search over Encrypted Cloud Data | arXiv | 2020 | Link |
| SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images | arXiv | 2020 | Link |
| Stratified cross-validation for unbiased and privacy-preserving federated learning | arXiv | 2020 | Link |
| Strong Secrecy for General Multiple-Access Wiretap Channels | arXiv | 2020 | Link |
| Stronger and Faster Wasserstein Adversarial Attacks | arXiv | 2020 | Link |
| Subverting Privacy-Preserving GANs: Hiding Secrets in Sanitized Images | arXiv | 2020 | Link |
| TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems | arXiv | 2020 | Link |
| The Capacity of Single-Server Weakly-Private Information Retrieval | arXiv | 2020 | Link |
| The Privacy Funnel from the viewpoint of Local Differential Privacy | arXiv | 2020 | Link |
| This Face Does Not Exist ... But It Might Be Yours! Identity Leakage in Generative Models | arXiv | 2020 | Link |
| Toward Efficient Quantum Key Distribution Reconciliation | arXiv | 2020 | Link |
| Towards Gender-Neutral Face Descriptors for Mitigating Bias in Face Recognition | arXiv | 2020 | Link |
| Trading Data For Learning: Incentive Mechanism For On-Device Federated Learning | arXiv | 2020 | Link |
| TrappeD: DRAM Trojan Designs for Information Leakage and Fault Injection Attacks | arXiv | 2020 | Link |
| Two Efficient Measurement Device Independent Quantum Dialogue Protocols | arXiv | 2020 | Link |
| Two-timescale Beamforming Optimization for Intelligent Reflecting Surface Aided Multiuser Communication with QoS Constraints | arXiv | 2020 | Link |
| Unexpected Information Leakage of Differential Privacy Due to Linear Property of Queries | arXiv | 2020 | Link |
| Unsupervised Anomaly Detection From Semantic Similarity Scores | arXiv | 2020 | Link |
| VerifyTL: Secure and Verifiable Collaborative Transfer Learning | arXiv | 2020 | Link |
| Vertically Federated Graph Neural Network for Privacy-Preserving Node Classification | arXiv | 2020 | Link |
| WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity | arXiv | 2020 | Link |
| When Federated Learning Meets Blockchain: A New Distributed Learning Paradigm | arXiv | 2020 | Link |
| When Machine Unlearning Jeopardizes Privacy | arXiv | 2020 | Link |
| Wireless Federated Learning with Local Differential Privacy | arXiv | 2020 | Link |
2019
| Title | Venue | Year | Link |
|---|---|---|---|
| ("Oops! Had the silly thing in reverse")---Optical injection attacks in through LED status indicators | arXiv | 2019 | Link |
| A First Look at References from the Dark to Surface Web World | arXiv | 2019 | Link |
| A Submodularity-based Agglomerative Clustering Algorithm for the Privacy Funnel | arXiv | 2019 | Link |
| AI slipping on tiles: data leakage in digital pathology | arXiv | 2019 | Link |
| Adaptive Regularization Parameter Choice Rules for Large-Scale Problems | arXiv | 2019 | Link |
| Adversarial Learning of Privacy-Preserving and Task-Oriented Representations | arXiv | 2019 | Link |
| Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment | arXiv | 2019 | Link |
| An Optimal Stable Selective Model Inversion for Nonminimum-phase Systems | arXiv | 2019 | Link |
| Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes | arXiv | 2019 | Link |
| Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach | arXiv | 2019 | Link |
| Analyzing Information Leakage of Updates to Natural Language Models | arXiv | 2019 | Link |
| Application Inference using Machine Learning based Side Channel Analysis | arXiv | 2019 | Link |
| Approximate Bayesian Model Inversion for PDEs with Heterogeneous and State-Dependent Coefficients | arXiv | 2019 | Link |
| Attack Trees for Security and Privacy in Social Virtual Reality Learning Environments | arXiv | 2019 | Link |
| AuditShare: Sensitive Data Sharing with Reliable Leaker Identification | arXiv | 2019 | Link |
| BAYHENN: Combining Bayesian Deep Learning and Homomorphic Encryption for Secure DNN Inference | arXiv | 2019 | Link |
| Bayesian fusion and multimodal DCM for EEG and fMRI | arXiv | 2019 | Link |
| Bounding light source side channels in QKD via Hong-Ou-Mandel interference | arXiv | 2019 | Link |
| CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs | arXiv | 2019 | Link |
| Can We Prove Time Protection? | arXiv | 2019 | Link |
| Characterizing Membership Privacy in Stochastic Gradient Langevin Dynamics | arXiv | 2019 | Link |
| Cloud model inversions of strong chromospheric absorption lines using principal component analysis | arXiv | 2019 | Link |
| Continuous variable controlled quantum dialogue and secure multiparty quantum computation | arXiv | 2019 | Link |
| Controllable Planning, Responsibility, and Information in Automatic Driving Technology | arXiv | 2019 | Link |
| Controller-independent bidirectional quantum direct communication | arXiv | 2019 | Link |
| Convolutional Neural Networks for Classification of Alzheimer's Disease: Overview and Reproducible Evaluation | arXiv | 2019 | Link |
| Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer | arXiv | 2019 | Link |
| Cryptanalysis and improvement of several quantum private comparison protocols | arXiv | 2019 | Link |
| Detecting Fault Injection Attacks with Runtime Verification | arXiv | 2019 | Link |
| Developing Non-Stochastic Privacy-Preserving Policies Using Agglomerative Clustering | arXiv | 2019 | Link |
| DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference | arXiv | 2019 | Link |
| Differential privacy with partial knowledge | arXiv | 2019 | Link |
| Differentially Private ADMM for Distributed Medical Machine Learning | arXiv | 2019 | Link |
| Differentially Private Link Prediction With Protected Connections | arXiv | 2019 | Link |
| Differentially Private Model Publishing for Deep Learning | arXiv | 2019 | Link |
| Differentially Private Survival Function Estimation | arXiv | 2019 | Link |
| Disorder-induced Enhancement of Entanglement Growth in One Dimension: Information Leakage at the scale of localization length | arXiv | 2019 | Link |
| Distortion Estimation Through Explicit Modeling of the Refractive Surface | arXiv | 2019 | Link |
| Estimating Numerical Distributions under Local Differential Privacy | arXiv | 2019 | Link |
| FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme | arXiv | 2019 | Link |
| Federated Generative Privacy | arXiv | 2019 | Link |
| Federated Learning with Differential Privacy: Algorithms and Performance Analysis | arXiv | 2019 | Link |
| Fixed Region Beamforming using Frequency Diverse Subarray for Secure Mmwave Wireless Communications | arXiv | 2019 | Link |
| Fundamental Limits of Identification System With Secret Binding Under Noisy Enrollment | arXiv | 2019 | Link |
| Future Data Helps Training: Modeling Future Contexts for Session-based Recommendation | arXiv | 2019 | Link |
| GAMIN: An Adversarial Approach to Black-Box Model Inversion | arXiv | 2019 | Link |
| Generalization in Generative Adversarial Networks: A Novel Perspective from Privacy Protection | arXiv | 2019 | Link |
| How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning | arXiv | 2019 | Link |
| I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks | arXiv | 2019 | Link |
| Identification, Secrecy, Template, and Privacy-Leakage of Biometric Identification System Under Noisy Enrollment | arXiv | 2019 | Link |
| Image Decomposition and Classification through a Generative Model | arXiv | 2019 | Link |
| Improving Small-Scale CMB Lensing Reconstruction | arXiv | 2019 | Link |
| Improving the performance of Twin-Field Quantum Key Distribution | arXiv | 2019 | Link |
| Incremental Adaptive Attack Synthesis | arXiv | 2019 | Link |
| InfoRest: Restricting Privacy Leakage to Online Social Network App | arXiv | 2019 | Link |
| Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses | arXiv | 2019 | Link |
| Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks | arXiv | 2019 | Link |
| KLEESPECTRE: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution | arXiv | 2019 | Link |
| Learning Privately over Distributed Features: An ADMM Sharing Approach | arXiv | 2019 | Link |
| Learning to Prevent Leakage: Privacy-Preserving Inference in the Mobile Cloud | arXiv | 2019 | Link |
| Lightning-Fast and Privacy-Preserving Outsourced Computation in the Cloud | arXiv | 2019 | Link |
| MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting | arXiv | 2019 | Link |
| Maximal Information Leakage based Privacy Preserving Data Disclosure Mechanisms | arXiv | 2019 | Link |
| Membership Model Inversion Attacks for Deep Networks | arXiv | 2019 | Link |
| Minimizing the Information Leakage Regarding High-Level Task Specifications | arXiv | 2019 | Link |
| Mitigating Information Leakage in Image Representations: A Maximum Entropy Approach | arXiv | 2019 | Link |
| Model Inversion Networks for Model-Based Optimization | arXiv | 2019 | Link |
| MuonTrap: Preventing Cross-Domain Spectre-Like Attacks by Capturing Speculative State | arXiv | 2019 | Link |
| Noiseless Privacy | arXiv | 2019 | Link |
| Novelty Messages Filtering for Multi Agent Privacy-preserving Planning | arXiv | 2019 | Link |
| On Safeguarding Privacy and Security in the Framework of Federated Learning | arXiv | 2019 | Link |
| On the Compositionality of Dynamic Leakage and Its Application to the Quantification Problem | arXiv | 2019 | Link |
| On the Information Leakage in Private Information Retrieval Systems | arXiv | 2019 | Link |
| On the Risk of Cancelable Biometrics | arXiv | 2019 | Link |
| On the Secrecy Performance and Power Allocation in Relaying Networks with Untrusted Relay in the Partial Secrecy Regime | arXiv | 2019 | Link |
| P3SGD: Patient Privacy Preserving SGD for Regularizing Deep CNNs in Pathological Image Classification | arXiv | 2019 | Link |
| PAGURUS: Low-Overhead Dynamic Information Flow Tracking on Loosely Coupled Accelerators | arXiv | 2019 | Link |
| PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance | arXiv | 2019 | Link |
| PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos | arXiv | 2019 | Link |
| Parametric Timed Model Checking for Guaranteeing Timed Opacity | arXiv | 2019 | Link |
| Pentest on an Internet Mobile App: A Case Study using Tramonto | arXiv | 2019 | Link |
| Physical Layer Secret Key Generation in Static Environments | arXiv | 2019 | Link |
| Privacy Against Brute-Force Inference Attacks | arXiv | 2019 | Link |
| Privacy Leakage Avoidance with Switching Ensembles | arXiv | 2019 | Link |
| Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study | arXiv | 2019 | Link |
| Privacy Risks of Securing Machine Learning Models against Adversarial Examples | arXiv | 2019 | Link |
| Privacy-Aware Location Sharing with Deep Reinforcement Learning | arXiv | 2019 | Link |
| Privacy-cost trade-off in a smart meter system with a renewable energy source and a rechargeable battery | arXiv | 2019 | Link |
| Private Authentication with Physical Identifiers Through Broadcast Channel Measurements | arXiv | 2019 | Link |
| Privately detecting changes in unknown distributions | arXiv | 2019 | Link |
| Proof of Federated Learning: A Novel Energy-recycling Consensus Algorithm | arXiv | 2019 | Link |
| Protecting Spatiotemporal Event Privacy in Continuous Location-Based Services | arXiv | 2019 | Link |
| Quantifying (Hyper) Parameter Leakage in Machine Learning | arXiv | 2019 | Link |
| Quantifying Dynamic Leakage: Complexity Analysis and Model Counting-based Calculation | arXiv | 2019 | Link |
| Quantifying information flow in interactive systems | arXiv | 2019 | Link |
| Quantifying the Privacy Risks of Learning High-Dimensional Graphical Models | arXiv | 2019 | Link |
| RNN-T For Latency Controlled ASR With Improved Beam Search | arXiv | 2019 | Link |
| Reconstruction and Membership Inference Attacks against Generative Models | arXiv | 2019 | Link |
| Robust and Secure Wireless Communications via Intelligent Reflecting Surfaces | arXiv | 2019 | Link |
| Robust or Private? Adversarial Training Makes Models More Vulnerable to Privacy Attacks | arXiv | 2019 | Link |
| Robustness of Low-Complexity Massive MIMO Architectures Against Passive Eavesdropping | arXiv | 2019 | Link |
| Robustness of Maximal $α$-Leakage to Side Information | arXiv | 2019 | Link |
| SAFECHAIN: Securing Trigger-Action Programming from Attack Chains (Extended Technical Report) | arXiv | 2019 | Link |
| Secrecy and Covert Communications against UAV Surveillance via Multi-Hop Networks | arXiv | 2019 | Link |
| Secure Distribution of Protected Content in Information-Centric Networking | arXiv | 2019 | Link |
| Secure Regularized Zero Forcing for Multiuser MIMOME Channels | arXiv | 2019 | Link |
| SecureBoost: A Lossless Federated Learning Framework | arXiv | 2019 | Link |
| SecureGBM: Secure Multi-Party Gradient Boosting | arXiv | 2019 | Link |
| SoK: Chasing Accuracy and Privacy, and Catching Both in Differentially Private Histogram Publication | arXiv | 2019 | Link |
| SvTPM: A Secure and Efficient vTPM in the Cloud | arXiv | 2019 | Link |
| The Arrival of News and Return Jumps in Stock Markets: A Nonparametric Approach | arXiv | 2019 | Link |
| The Conditional Information Leakage Given Eavesdropper's Received Signals in Wiretap Channels | arXiv | 2019 | Link |
| The Dirichlet Mechanism for Differential Privacy on the Unit Simplex | arXiv | 2019 | Link |
| The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks | arXiv | 2019 | Link |
| The importance of evaluating the complete automated knowledge-based planning pipeline | arXiv | 2019 | Link |
| Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks | arXiv | 2019 | Link |
| Time-aware Gradient Attack on Dynamic Network Link Prediction | arXiv | 2019 | Link |
| To the numerical solution of the inverse multi-frequency scalar acoustics problem | arXiv | 2019 | Link |
| Towards Distributed Privacy-Preserving Prediction | arXiv | 2019 | Link |
| Towards Security Threats of Deep Learning Systems: A Survey | arXiv | 2019 | Link |
| Towards a Better Indicator for Cache Timing Channels | arXiv | 2019 | Link |
| Tracking sex: The implications of widespread sexual data leakage and tracking on porn websites | arXiv | 2019 | Link |
| Trade-offs and Guarantees of Adversarial Representation Learning for Information Obfuscation | arXiv | 2019 | Link |
| Universal Mutual Information Privacy Guarantees for Smart Meters | arXiv | 2019 | Link |
| Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning | arXiv | 2019 | Link |
| Upper Bound of Collective Attacks on Quantum Key Distribution | arXiv | 2019 | Link |
| VideoDP: A Universal Platform for Video Analytics with Differential Privacy | arXiv | 2019 | Link |
| ZETH: On Integrating Zerocash on Ethereum | arXiv | 2019 | Link |
| ZombieLoad: Cross-Privilege-Boundary Data Sampling | arXiv | 2019 | Link |
| ct-fuzz: Fuzzing for Timing Leaks | arXiv | 2019 | Link |
2018
| Title | Venue | Year | Link |
|---|---|---|---|
| A Blockchain-based Flight Data Recorder for Cloud Accountability | arXiv | 2018 | Link |
| A Cascaded Convolutional Neural Network for Single Image Dehazing | arXiv | 2018 | Link |
| A Game-Theoretic Approach to Information-Flow Control via Protocol Composition | arXiv | 2018 | Link |
| A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem | arXiv | 2018 | Link |
| A Hybrid Artificial-Noise and Secret-Key Scheme for Securing OFDM Transmissions in V2G Networks | arXiv | 2018 | Link |
| A Tunable Measure for Information Leakage | arXiv | 2018 | Link |
| A novel hybrid score level and decision level fusion scheme for cancelable multi-biometric verification | arXiv | 2018 | Link |
| Adversarial Texts with Gradient Methods | arXiv | 2018 | Link |
| Algorithms that Remember: Model Inversion Attacks and Data Protection Law | arXiv | 2018 | Link |
| An Algebraic Approach for Reasoning About Information Flow | arXiv | 2018 | Link |
| An Operational Approach to Information Leakage | arXiv | 2018 | Link |
| Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices | arXiv | 2018 | Link |
| Anonymous Single-Sign-On for n designated services with traceability | arXiv | 2018 | Link |
| Artificial Impostors for Location Privacy Preservation | arXiv | 2018 | Link |
| Asymmetric response to PMI announcements in China's stock returns | arXiv | 2018 | Link |
| BPDS: A Blockchain based Privacy-Preserving Data Sharing for Electronic Medical Records | arXiv | 2018 | Link |
| Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning | arXiv | 2018 | Link |
| Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator | arXiv | 2018 | Link |
| Capstone: Mobility Modeling on Smartphones to Achieve Privacy by Design | arXiv | 2018 | Link |
| Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach | arXiv | 2018 | Link |
| Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning | arXiv | 2018 | Link |
| Confidential Inference via Ternary Model Partitioning | arXiv | 2018 | Link |
| Content-Based Multi-Source Encrypted Image Retrieval in Clouds with Privacy Preservation | arXiv | 2018 | Link |
| Contextual Bandits with Stochastic Experts | arXiv | 2018 | Link |
| Controllable Identifier Measurements for Private Authentication with Secret Keys | arXiv | 2018 | Link |
| Crashing Privacy: An Autopsy of a Web Browser's Leaked Crash Reports | arXiv | 2018 | Link |
| Cryptanalysis of a One-Time Code-Based Digital Signature Scheme | arXiv | 2018 | Link |
| Data Synthesis based on Generative Adversarial Networks | arXiv | 2018 | Link |
| Deanonymizing Tor hidden service users through Bitcoin transactions analysis | arXiv | 2018 | Link |
| Decoy-state quantum key distribution with a leaky source | arXiv | 2018 | Link |
| Detecting Data Leakage from Databases on Android Apps with Concept Drift | arXiv | 2018 | Link |
| Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory | arXiv | 2018 | Link |
| Development of probabilistic dam breach model using Bayesian inference | arXiv | 2018 | Link |
| Differentially Private Data Generative Models | arXiv | 2018 | Link |
| Differentially Private User-based Collaborative Filtering Recommendation Based on K-means Clustering | arXiv | 2018 | Link |
| DroidMark: A Tool for Android Malware Detection using Taint Analysis and Bayesian Network | arXiv | 2018 | Link |
| EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing | arXiv | 2018 | Link |
| Eavesdropping and countermeasures for backflash side channel in quantum cryptography | arXiv | 2018 | Link |
| Efficient treatment of model discrepancy by Gaussian Processes - Importance for imbalanced multiple constraint inversions | arXiv | 2018 | Link |
| Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing | arXiv | 2018 | Link |
| Exploiting Data Sensitivity on Partitioned Data | arXiv | 2018 | Link |
| False-Accept/False-Reject Trade-offs in Biometric Authentication Systems | arXiv | 2018 | Link |
| Fast Gradient Attack on Network Embedding | arXiv | 2018 | Link |
| Finite-key security analysis for quantum key distribution with leaky sources | arXiv | 2018 | Link |
| Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints | arXiv | 2018 | Link |
| HASP: A High-Performance Adaptive Mobile Security Enhancement Against Malicious Speech Recognition | arXiv | 2018 | Link |
| High Dimensional Model Representation as a Glass Box in Supervised Machine Learning | arXiv | 2018 | Link |
| How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering? | arXiv | 2018 | Link |
| Hybrid Statistical Estimation of Mutual Information and its Application to Information Flow | arXiv | 2018 | Link |
| I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators | arXiv | 2018 | Link |
| Ice state evolution during spring in Richardson crater, Mars | arXiv | 2018 | Link |
| LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT | arXiv | 2018 | Link |
| Law and Adversarial Machine Learning | arXiv | 2018 | Link |
| Lclean: A Plausible Approach to Individual Trajectory Data Sanitization | arXiv | 2018 | Link |
| Leakage and Protocol Composition in a Game-Theoretic Perspective | arXiv | 2018 | Link |
| Light Ears: Information Leakage via Smart Lights | arXiv | 2018 | Link |
| Link Prediction Adversarial Attack | arXiv | 2018 | Link |
| Local Obfuscation Mechanisms for Hiding Probability Distributions | arXiv | 2018 | Link |
| Location Privacy in Cognitive Radio Networks: A Survey | arXiv | 2018 | Link |
| Low Latency Privacy Preserving Inference | arXiv | 2018 | Link |
| Meltdown | arXiv | 2018 | Link |
| MicroWalk: A Framework for Finding Side Channels in Binaries | arXiv | 2018 | Link |
| Multiple Antennas Secure Transmission under Pilot Spoofing and Jamming Attack | arXiv | 2018 | Link |
| No Peek: A Survey of private distributed deep learning | arXiv | 2018 | Link |
| On Robustness of Massive MIMO Systems Against Passive Eavesdropping under Antenna Selection | arXiv | 2018 | Link |
| On Secure Transmission Design: An Information Leakage Perspective | arXiv | 2018 | Link |
| On the Robustness of Information-Theoretic Privacy Measures and Mechanisms | arXiv | 2018 | Link |
| On the Security Analysis of a Cooperative Incremental Relaying Protocol in the Presence of an Active Eavesdropper | arXiv | 2018 | Link |
| On the Security of an Unconditionally Secure, Universally Composable Inner Product Protocol | arXiv | 2018 | Link |
| Optimal Accuracy-Privacy Trade-Off for Secure Multi-Party Computations | arXiv | 2018 | Link |
| Optimal Utility-Privacy Trade-off with Total Variation Distance as a Privacy Measure | arXiv | 2018 | Link |
| Peek-a-Boo: I see your smart home activities, even encrypted! | arXiv | 2018 | Link |
| Practical Decentralized Attribute-Based Delegation using Secure Name Systems | arXiv | 2018 | Link |
| Preserving Both Privacy and Utility in Network Trace Anonymization | arXiv | 2018 | Link |
| Privacy Leakages in Approximate Adders | arXiv | 2018 | Link |
| Privacy Under Hard Distortion Constraints | arXiv | 2018 | Link |
| Privacy against a Hypothesis Testing Adversary | arXiv | 2018 | Link |
| Privacy in Social Media: Identification, Mitigation and Applications | arXiv | 2018 | Link |
| Privacy-Preserving Collaborative Deep Learning with Unreliable Participants | arXiv | 2018 | Link |
| Privacy-Protective-GAN for Face De-identification | arXiv | 2018 | Link |
| Privacy-preserving Machine Learning through Data Obfuscation | arXiv | 2018 | Link |
| Privacy-preserving Sensory Data Recovery | arXiv | 2018 | Link |
| Privacy-preserving Stochastic Gradual Learning | arXiv | 2018 | Link |
| Privacy-preserving smart meter control strategy including energy storage losses | arXiv | 2018 | Link |
| Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks (Extended Version) | arXiv | 2018 | Link |
| Processor Hardware Security Vulnerabilities and their Detection by Unique Program Execution Checking | arXiv | 2018 | Link |
| Quantum Network Code for Multiple-Unicast Network with Quantum Invertible Linear Operations | arXiv | 2018 | Link |
| Reducing Metadata Leakage from Encrypted Files and Communication with PURBs | arXiv | 2018 | Link |
| Refined security proof of the round-robin differential phase shift quantum key distribution and its improved performance in the finite-sized case | arXiv | 2018 | Link |
| Research on the Security of Blockchain Data: A Survey | arXiv | 2018 | Link |
| Round-Robin Differential Phase-Shift Quantum Key Distribution with Twisted Photons | arXiv | 2018 | Link |
| S-RL Toolbox: Environments, Datasets and Evaluation Metrics for State Representation Learning | arXiv | 2018 | Link |
| Secrecy Amplification for Distributed Encrypted Sources with Correlated Keys using Affine Encoders | arXiv | 2018 | Link |
| Secure Face Matching Using Fully Homomorphic Encryption | arXiv | 2018 | Link |
| Secure Modulo Sum via Multiple Access Channel | arXiv | 2018 | Link |
| Securing OFDM-Based Wireless Links Using Temporal Artificial-Noise Injection | arXiv | 2018 | Link |
| Security and Privacy Issues in Deep Learning | arXiv | 2018 | Link |
| Self-Stabilizing and Private Distributed Shared Atomic Memory in Seldomly Fair Message Passing Networks | arXiv | 2018 | Link |
| Semantic Security via Seeded Modular Coding Schemes and Ramanujan Graphs | arXiv | 2018 | Link |
| Severity Level of Permissions in Role-Based Access Control | arXiv | 2018 | Link |
| Solving DWF Dirac Equation Using Multisplitting Preconditioned Conjugate Gradient | arXiv | 2018 | Link |
| The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem | arXiv | 2018 | Link |
| The Trusted Server: A secure computational environment for privacy compliant evaluations on plain personal data | arXiv | 2018 | Link |
| The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures | arXiv | 2018 | Link |
| Thinging Machine applied to Information Leakage | arXiv | 2018 | Link |
| Time Protection: the Missing OS Abstraction | arXiv | 2018 | Link |
| Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs | arXiv | 2018 | Link |
| Uniqueness and direct imaging method for inverse scattering by locally rough surfaces with phaseless near-field data | arXiv | 2018 | Link |
| Validating Hyperspectral Image Segmentation | arXiv | 2018 | Link |
| What's the Over/Under? Probabilistic Bounds on Information Leakage | arXiv | 2018 | Link |
| ZebraLancer: Decentralized Crowdsourcing of Human Knowledge atop Open Blockchain | arXiv | 2018 | Link |
2017
| Title | Venue | Year | Link |
|---|---|---|---|
| A Covert Queueing Channel in FCFS Schedulers | arXiv | 2017 | Link |
| A Covert Queueing Channel in Round Robin Schedulers | arXiv | 2017 | Link |
| A Permission-Dependent Type System for Secure Information Flow Analysis | arXiv | 2017 | Link |
| A semi-parametric estimation for max-mixture spatial processes | arXiv | 2017 | Link |
| Achieving Dalenius' Goal of Data Privacy with Practical Assumptions | arXiv | 2017 | Link |
| An HMM-based Multi-sensor Approach for Continuous Mobile Authentication | arXiv | 2017 | Link |
| Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS) | arXiv | 2017 | Link |
| Applications of Economic and Pricing Models for Wireless Network Security: A Survey | arXiv | 2017 | Link |
| Approximate Quantum Error Correction Revisited: Introducing the Alpha-bit | arXiv | 2017 | Link |
| Bandwidth-efficient Storage Services for Mitigating Side Channel Attack | arXiv | 2017 | Link |
| Chlorine and Bromine Isotope Fractionation of Halogenated Organic Pollutants on Gas Chromatography Columns | arXiv | 2017 | Link |
| Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems | arXiv | 2017 | Link |
| Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory | arXiv | 2017 | Link |
| Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning | arXiv | 2017 | Link |
| Differentially Private Neighborhood-based Recommender Systems | arXiv | 2017 | Link |
| Distributed Differential Privacy By Sampling | arXiv | 2017 | Link |
| Efficient Privacy Preserving Viola-Jones Type Object Detection via Random Base Image Representation | arXiv | 2017 | Link |
| Emerging Privacy Issues and Solutions in Cyber-Enabled Sharing Services: From Multiple Perspectives | arXiv | 2017 | Link |
| Families of Quantum Fingerprinting Protocols | arXiv | 2017 | Link |
| Fast amortized inference of neural activity from calcium imaging data with variational autoencoders | arXiv | 2017 | Link |
| Guidelines for Artificial Intelligence Containment | arXiv | 2017 | Link |
| Hybrid Procoder and Combiner Design for Secure Transmission in mmWave MIMO Systems | arXiv | 2017 | Link |
| Identifying Best Interventions through Online Importance Sampling | arXiv | 2017 | Link |
| Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification | arXiv | 2017 | Link |
| Information Leakage Games | arXiv | 2017 | Link |
| Information-Theoretic Privacy with General Distortion Constraints | arXiv | 2017 | Link |
| Iterative Machine Learning for Output Tracking | arXiv | 2017 | Link |
| Joint secrecy over the K-Transmitter Multiple Access Channel | arXiv | 2017 | Link |
| LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications | arXiv | 2017 | Link |
| Lighting Two Candles With One Flame: An Unaided Human Identification Protocol With Security Beyond Conventional Limit | arXiv | 2017 | Link |
| Measurement Device Independent Quantum Dialogue | arXiv | 2017 | Link |
| Measuring Information Leakage in Website Fingerprinting Attacks and Defenses | arXiv | 2017 | Link |
| Navigating dark liquidity (How Fisher catches Poisson in the Dark) | arXiv | 2017 | Link |
| Order-Preserving Encryption Using Approximate Integer Common Divisors | arXiv | 2017 | Link |
| Parallel Device-Independent Quantum Key Distribution | arXiv | 2017 | Link |
| Privacy Preserving and Collusion Resistant Energy Sharing | arXiv | 2017 | Link |
| Privacy-Preserving Economic Dispatch in Competitive Electricity Market | arXiv | 2017 | Link |
| Privacy-Utility Tradeoffs under Constrained Data Release Mechanisms | arXiv | 2017 | Link |
| PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage | arXiv | 2017 | Link |
| Private Data System Enabling Self-Sovereign Storage Managed by Executable Choreographies | arXiv | 2017 | Link |
| Quantifying Differential Privacy in Continuous Data Release under Temporal Correlations | arXiv | 2017 | Link |
| Re-DPoctor: Real-time health data releasing with w-day differential privacy | arXiv | 2017 | Link |
| Reconstructing Small Scale Lenses from the Cosmic Microwave Background Temperature Fluctuations | arXiv | 2017 | Link |
| Refinement-based Specification and Security Analysis of Separation Kernels | arXiv | 2017 | Link |
| Resource Allocation for Secure Full-Duplex OFDMA Radio Systems | arXiv | 2017 | Link |
| Rethinking Split Manufacturing: An Information-Theoretic Approach with Secure Layout Techniques | arXiv | 2017 | Link |
| Robust and Secure Resource Allocation for Full-Duplex MISO Multicarrier NOMA Systems | arXiv | 2017 | Link |
| Round-robin-differential-phase-shift quantum key distribution with and without monitoring signal disturbance | arXiv | 2017 | Link |
| Sampling High Throughput Data for Anomaly Detection of Data-Base Activity | arXiv | 2017 | Link |
| Secrecy and Robustness for Active Attack in Secure Network Coding and its Application to Network Quantum Key Distribution | arXiv | 2017 | Link |
| Secure Beamforming in Full-Duplex SWIPT Systems | arXiv | 2017 | Link |
| Secure two-way communication via a wireless powered untrusted relay and friendly jammer | arXiv | 2017 | Link |
| Securing Databases from Probabilistic Inference | arXiv | 2017 | Link |
| Smart Meter Privacy via the Trapdoor Channel | arXiv | 2017 | Link |
| Smart Meter Privacy with Renewable Energy and an Energy Storage Device | arXiv | 2017 | Link |
| Software Grand Exposure: SGX Cache Attacks Are Practical | arXiv | 2017 | Link |
| Tensor Decompositions for Modeling Inverse Dynamics | arXiv | 2017 | Link |
| The VACCINE Framework for Building DLP Systems | arXiv | 2017 | Link |
| Types for Location and Data Security in Cloud Environments | arXiv | 2017 | Link |
| Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be | arXiv | 2017 | Link |
| What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy | arXiv | 2017 | Link |
| Widths of regular and context-free languages | arXiv | 2017 | Link |
2016
| Title | Venue | Year | Link |
|---|---|---|---|
| A Cross-Platform Collection of Social Network Profiles | arXiv | 2016 | Link |
| AntMonitor: A System for On-Device Mobile Network Monitoring and its Applications | arXiv | 2016 | Link |
| Backflash light characterization to prevent QKD zero-error hacking | arXiv | 2016 | Link |
| EMFS: Repurposing SMTP and IMAP for Data Storage and Synchronization | arXiv | 2016 | Link |
| Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors | arXiv | 2016 | Link |
| FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping | arXiv | 2016 | Link |
| Generalized rank weights of reducible codes, optimal cases and related properties | arXiv | 2016 | Link |
| Information Security as Strategic (In)effectivity | arXiv | 2016 | Link |
| Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires | arXiv | 2016 | Link |
| Long-Term Growth Rate of Expected Utility for Leveraged ETFs: Martingale Extraction Approach | arXiv | 2016 | Link |
| Maximum likelihood estimates of pairwise rearrangement distances | arXiv | 2016 | Link |
| Multiphoton controllable transport between remote resonators | arXiv | 2016 | Link |
| OSSINT - Open Source Social Network Intelligence An efficient and effective way to uncover "private" information in OSN profiles | arXiv | 2016 | Link |
| On Secrecy Metrics for Physical Layer Security over Quasi-Static Fading Channels | arXiv | 2016 | Link |
| Performance of Lattice Coset Codes on Universal Software Radio Peripherals | arXiv | 2016 | Link |
| Personal Information Leakage During Password Recovery of Internet Services | arXiv | 2016 | Link |
| Pilot Contamination Attack Detection by Key-Confirmation in Secure MIMO Systems | arXiv | 2016 | Link |
| Preventing side-channel effects in continuous-variable quantum key distribution | arXiv | 2016 | Link |
| Privacy Leakage through Innocent Content Sharing in Online Social Networks | arXiv | 2016 | Link |
| Privacy, Secrecy, and Storage with Multiple Noisy Measurements of Identifiers | arXiv | 2016 | Link |
| Privacy-Constrained Remote Source Coding | arXiv | 2016 | Link |
| Privacy-Protecting Energy Management Unit through Model-Distribution Predictive Control | arXiv | 2016 | Link |
| Quantifying Differential Privacy under Temporal Correlations | arXiv | 2016 | Link |
| Quantum Advantage on Information Leakage for Equality | arXiv | 2016 | Link |
| Ripple: Reflection Analysis for Android Apps in Incomplete Information Environments | arXiv | 2016 | Link |
| Robust Privacy-Utility Tradeoffs under Differential Privacy and Hamming Distortion | arXiv | 2016 | Link |
| SICS: Secure In-Cloud Service Function Chaining | arXiv | 2016 | Link |
| Secure Group Testing | arXiv | 2016 | Link |
| Smart Meter Privacy with Renewable Energy and a Finite Capacity Battery | arXiv | 2016 | Link |
| Stealing PINs via Mobile Sensors: Actual Risk versus User Perception | arXiv | 2016 | Link |
| Strong Secrecy for Cooperative Broadcast Channels | arXiv | 2016 | Link |
| The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps | arXiv | 2016 | Link |
| Virtualization Technology: Cross-VM Cache Side Channel Attacks make it Vulnerable | arXiv | 2016 | Link |
| Well-Rounded Lattices: Towards Optimal Coset Codes for Gaussian and Fading Wiretap Channels | arXiv | 2016 | Link |
| Wiretap Channels with Random States Non-Causally Available at the Encoder | arXiv | 2016 | Link |
2015
| Title | Venue | Year | Link |
|---|---|---|---|
| A New Covert Channel over Cellular Voice Channel in Smartphones | arXiv | 2015 | Link |
| A New Storage Optimized Honeyword Generation Approach for Enhancing Security and Usability | arXiv | 2015 | Link |
| A regularizing iterative ensemble Kalman method for PDE-constrained inverse problems | arXiv | 2015 | Link |
| Active Eavesdropping via Spoofing Relay Attack | arXiv | 2015 | Link |
| Authenticated Semi-quantum Direct Communication Protocols using Bell States | arXiv | 2015 | Link |
| Broadcast Channels with Privacy Leakage Constraints | arXiv | 2015 | Link |
| Classifying Unrooted Gaussian Trees under Privacy Constraints | arXiv | 2015 | Link |
| Communication and Randomness Lower Bounds for Secure Computation | arXiv | 2015 | Link |
| CrowdSurf: Empowering Informed Choices in the Web | arXiv | 2015 | Link |
| DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks | arXiv | 2015 | Link |
| Danger is My Middle Name: Experimenting with SSL Vulnerabilities in Android Apps | arXiv | 2015 | Link |
| Dark-Pool Perspective of Optimal Market Making | arXiv | 2015 | Link |
| Detection of Information leakage in cloud | arXiv | 2015 | Link |
| Deterministically Deterring Timing Attacks in Deterland | arXiv | 2015 | Link |
| Experimental Passive Round-Robin Differential Phase-Shift Quantum Key Distribution | arXiv | 2015 | Link |
| Experimental demonstration of quantum key distribution without monitoring of the signal disturbance | arXiv | 2015 | Link |
| Graph Watermarks | arXiv | 2015 | Link |
| Individual Secrecy for the Broadcast Channel | arXiv | 2015 | Link |
| Individual secrecy for broadcast channels with receiver side information | arXiv | 2015 | Link |
| Information Leakage of Heterogeneous Encoded Correlated Sequences over Eavesdropped Channel | arXiv | 2015 | Link |
| Information-Theoretic Privacy for Smart Metering Systems with a Rechargeable Battery | arXiv | 2015 | Link |
| LinkMirage: How to Anonymize Links in Dynamic Social Systems | arXiv | 2015 | Link |
| Networks, Dynamic Factors, and the Volatility Analysis of High-Dimensional Financial Series | arXiv | 2015 | Link |
| Notes on Information-Theoretic Privacy | arXiv | 2015 | Link |
| On asymptotically good ramp secret sharing schemes | arXiv | 2015 | Link |
| On the Interference Alignment Designs for Secure Multiuser MIMO Systems | arXiv | 2015 | Link |
| On the similarities between generalized rank and Hamming weights and their applications to network coding | arXiv | 2015 | Link |
| Physical Layer Security in Massive MIMO | arXiv | 2015 | Link |
| Polynomial model inversion control: numerical tests and applications | arXiv | 2015 | Link |
| Practical round-robin differential-phase-shift quantum key distribution | arXiv | 2015 | Link |
| Practical security bounds against the Trojan-horse attack in quantum key distribution | arXiv | 2015 | Link |
| Private Date Exposure in Facebook and the Impact of Comprehensible Audience Selection Controls | arXiv | 2015 | Link |
| Quantitative Information Flow for Scheduler-Dependent Systems | arXiv | 2015 | Link |
| Quantitative information flow under generic leakage functions and adaptive adversaries | arXiv | 2015 | Link |
| Radial abundance gradients from planetary nebulae at different distances from the galactic plane | arXiv | 2015 | Link |
| Reasoning About Information Flow Security of Separation Kernels with Channel-based Communication | arXiv | 2015 | Link |
| Relative Generalized Hamming Weights of Cyclic Codes | arXiv | 2015 | Link |
| Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences | arXiv | 2015 | Link |
| Secret Key Agreement with Large Antenna Arrays under the Pilot Contamination Attack | arXiv | 2015 | Link |
| Secret key-based Identification and Authentication with a Privacy Constraint | arXiv | 2015 | Link |
| Security Games with Information Leakage: Modeling and Computation | arXiv | 2015 | Link |
| Smart Meter Privacy with an Energy Harvesting Device and Instantaneous Power Constraints | arXiv | 2015 | Link |
| Timeability of Extensive-Form Games | arXiv | 2015 | Link |
| Toward Practical Differential Privacy in Smart Grid with Capacity-Limited Rechargeable Batteries | arXiv | 2015 | Link |
| Universal Anomaly Detection: Algorithms and Applications | arXiv | 2015 | Link |
2014
| Title | Venue | Year | Link |
|---|---|---|---|
| A Distributed Framework for Scalable Search over Encrypted Documents | arXiv | 2014 | Link |
| A New Approach for Finding Cloned Profiles in Online Social Networks | arXiv | 2014 | Link |
| Algebraic double cut and join -- A group-theoretic approach to the operator on multichromosomal genomes | arXiv | 2014 | Link |
| An Empirical Study on Android for Saving Non-shared Data on Public Storage | arXiv | 2014 | Link |
| Certifying and removing disparate impact | arXiv | 2014 | Link |
| Characterization and suppression techniques for degree of radiation damping in inversion recovery measurements | arXiv | 2014 | Link |
| Complete elimination of information leakage in continuous-variable quantum communication channels | arXiv | 2014 | Link |
| Compressing Encrypted Data and Permutation Cipher | arXiv | 2014 | Link |
| Control of nonlinear systems: a model inversion approach | arXiv | 2014 | Link |
| Enable Portrait Privacy Protection in Photo Capturing and Sharing | arXiv | 2014 | Link |
| Experimental Passive Decoy-State Quantum Key Distribution | arXiv | 2014 | Link |
| From the Information Bottleneck to the Privacy Funnel | arXiv | 2014 | Link |
| Fundamental Finite Key Limits for One-Way Information Reconciliation in Quantum Key Distribution | arXiv | 2014 | Link |
| Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats | arXiv | 2014 | Link |
| Improved 3-Dimensional Security in Cloud Computing | arXiv | 2014 | Link |
| Improved depth imaging by constrained full-waveform inversion | arXiv | 2014 | Link |
| Information Leakage of Correlated Source Coded Sequences over Channel with an Eavesdropper | arXiv | 2014 | Link |
| Managing your Private and Public Data: Bringing down Inference Attacks against your Privacy | arXiv | 2014 | Link |
| Mitigating information leakage in a crowded spectrum of weakly anharmonic qubits | arXiv | 2014 | Link |
| PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices | arXiv | 2014 | Link |
| Privacy Games: Optimal User-Centric Data Obfuscation | arXiv | 2014 | Link |
| Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics | arXiv | 2014 | Link |
| Quantifying the Information Leakage in Timing Side Channels in Deterministic Work-Conserving Schedulers | arXiv | 2014 | Link |
| Rank-Based Inference over Web Databases | arXiv | 2014 | Link |
| Relative generalized Hamming weights of q-ary Reed-Muller codes | arXiv | 2014 | Link |
| Securing Cloud from Cloud Drain | arXiv | 2014 | Link |
| Smart Meter Privacy for Multiple Users in the Presence of an Alternative Energy Source | arXiv | 2014 | Link |
| Splitting and Matrix Exponential approach for jump-diffusion models with Inverse Normal Gaussian, Hyperbolic and Meixner jumps | arXiv | 2014 | Link |
| The Application of Differential Privacy for Rank Aggregation: Privacy and Accuracy | arXiv | 2014 | Link |
| The Conceptual Idea of Online Social Media Site (SMS) User Account Penetration Testing System | arXiv | 2014 | Link |
2013
| Title | Venue | Year | Link |
|---|---|---|---|
| A Case of Collusion: A Study of the Interface Between Ad Libraries and their Apps | arXiv | 2013 | Link |
| A New Approach to Decoding of Rational Irreducible Goppa code | arXiv | 2013 | Link |
| Abundance gradients in spiral disks: is the gradient inversion at high redshift real? | arXiv | 2013 | Link |
| An Information Theoretic Study of Timing Side Channels in Two-user Schedulers | arXiv | 2013 | Link |
| Behavior-Based online Incentive Mechanism for Crowd Sensing with Budget Constraints | arXiv | 2013 | Link |
| CUDA Leaks: Information Leakage in GPU Architectures | arXiv | 2013 | Link |
| Content-based data leakage detection using extended fingerprinting | arXiv | 2013 | Link |
| Determination of the pion distribution amplitude | arXiv | 2013 | Link |
| Entangled state engineering of vibrational modes in a multi-membrane optomechanical system | arXiv | 2013 | Link |
| Fundamental Limits of Caching with Secure Delivery | arXiv | 2013 | Link |
| Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers | arXiv | 2013 | Link |
| Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices | arXiv | 2013 | Link |
| Measuring Privacy Leakage for IDS Rules | arXiv | 2013 | Link |
| Mitigating Timing Side Channel in Shared Schedulers | arXiv | 2013 | Link |
| Modulus Computational Entropy | arXiv | 2013 | Link |
| On Secure Source Coding with Side Information at the Encoder | arXiv | 2013 | Link |
| Quantum Cryptography Using Various Reversible Quantum Logic Gates in WSNs | arXiv | 2013 | Link |
| Robust quantum data locking from phase modulation | arXiv | 2013 | Link |
| Secrecy Capacity Scaling in Large Cooperative Wireless Networks | arXiv | 2013 | Link |
| Secure Degrees of Freedom of the Gaussian Wiretap Channel with Helpers and No Eavesdropper CSI: Blind Cooperative Jamming | arXiv | 2013 | Link |
| Secure Source Coding with a Public Helper | arXiv | 2013 | Link |
| Signature Generation for Sensitive Information Leakage in Android Applications | arXiv | 2013 | Link |
| SilentSense: Silent User Identification via Dynamics of Touch and Movement Behavioral Biometrics | arXiv | 2013 | Link |
| Velocity estimation via registration-guided least-squares inversion | arXiv | 2013 | Link |
2012
| Title | Venue | Year | Link |
|---|---|---|---|
| Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and Approximation | arXiv | 2012 | Link |
| Auditing for Distributed Storage Systems | arXiv | 2012 | Link |
| Covariate assisted screening and estimation | arXiv | 2012 | Link |
| Efficient Superimposition Recovering Algorithm | arXiv | 2012 | Link |
| Information Leakage Neutralization for the Multi-Antenna Non-Regenerative Relay-Assisted Multi-Carrier Interference Channel | arXiv | 2012 | Link |
| Plugging Side-Channel Leaks with Timing Information Flow Control | arXiv | 2012 | Link |
| Privacy Against Statistical Inference | arXiv | 2012 | Link |
| Secure Cooperative Regenerating Codes for Distributed Storage Systems | arXiv | 2012 | Link |
| Semantically Secure Lattice Codes for the Gaussian Wiretap Channel | arXiv | 2012 | Link |
| Shortest Path Computation with No Information Leakage | arXiv | 2012 | Link |
| Spatially resolved X-ray spectroscopy and modeling of the nonthermal emission of the PWN in G0.9+0.1 | arXiv | 2012 | Link |
| The formation of planets in circumbinary disks | arXiv | 2012 | Link |
2011
| Title | Venue | Year | Link |
|---|---|---|---|
| A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security | arXiv | 2011 | Link |
| A Theoretical Analysis of Authentication, Privacy and Reusability Across Secure Biometric Systems | arXiv | 2011 | Link |
| Anthropic versus cosmological solutions to the coincidence problem | arXiv | 2011 | Link |
| Conditioning bounds for traveltime tomography in layered media | arXiv | 2011 | Link |
| Control of Wireless Networks with Secrecy | arXiv | 2011 | Link |
| Cryptovirology: Virus Approach | arXiv | 2011 | Link |
| Differential Privacy: on the trade-off between Utility and Information Leakage | arXiv | 2011 | Link |
| Formal Verification of Differential Privacy for Interactive Systems | arXiv | 2011 | Link |
| Formal approaches to information hiding: An analysis of interactive systems, statistical disclosure control, and refinement of specifications | arXiv | 2011 | Link |
| Hidden-Markov Program Algebra with iteration | arXiv | 2011 | Link |
| On fuzzy syndrome hashing with LDPC coding | arXiv | 2011 | Link |
| Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems | arXiv | 2011 | Link |
| Squeezed-state quantum key distribution upon imperfect reconciliation | arXiv | 2011 | Link |
| The Sender-Excited Secret Key Agreement Model: Capacity, Reliability and Secrecy Exponents | arXiv | 2011 | Link |
2010
| Title | Venue | Year | Link |
|---|---|---|---|
| A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations | arXiv | 2010 | Link |
| A generalized mean field theory of coarse-graining | arXiv | 2010 | Link |
| Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation | arXiv | 2010 | Link |
| Compromising Tor Anonymity Exploiting P2P Information Leakage | arXiv | 2010 | Link |
| Differential Privacy versus Quantitative Information Flow | arXiv | 2010 | Link |
| Double-pass variants for multi-shift BiCGstab(ell) | arXiv | 2010 | Link |
| Information Reconciliation for Quantum Key Distribution | arXiv | 2010 | Link |
| Magnetic dynamics driven by the spin-current generated via spin-Seebeck effect | arXiv | 2010 | Link |
| Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies | arXiv | 2010 | Link |
| Photon level crosstalk between parallel fibers installed in urban area | arXiv | 2010 | Link |
| Protection of Web Applications from Cross-Site Scripting Attacks in Browser Side | arXiv | 2010 | Link |
| Quantifying Information Leakage in Finite Order Deterministic Programs | arXiv | 2010 | Link |
| Realization of Quantum State Privacy Amplification in a Nuclear Magnetic Resonance Quantum System | arXiv | 2010 | Link |
| Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information? | arXiv | 2010 | Link |
| What are suspicious VoIP delays? | arXiv | 2010 | Link |
2009
| Title | Venue | Year | Link |
|---|---|---|---|
| Dynamics of a many-particle Landau-Zener model: inverse sweep | arXiv | 2009 | Link |
| Performance of Quantum Key Distribution Protocol with Dual-Rail Displaced Photon States | arXiv | 2009 | Link |
| Secure Source Coding with a Helper | arXiv | 2009 | Link |
| Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions | arXiv | 2009 | Link |
| The cannonball model of long GRBs - overview | arXiv | 2009 | Link |
| Transmitting an analog Gaussian source over a Gaussian wiretap channel under SNR mismatch | arXiv | 2009 | Link |
2008
| Title | Venue | Year | Link |
|---|---|---|---|
| Inverse decays and the relic density of the sterile sneutrino | arXiv | 2008 | Link |
2007
| Title | Venue | Year | Link |
|---|---|---|---|
| Chromospheric Cloud-Model Inversion Techniques | arXiv | 2007 | Link |
| DPA on quasi delay insensitive asynchronous circuits: formalization and improvement | arXiv | 2007 | Link |
2005
| Title | Venue | Year | Link |
|---|---|---|---|
| Formation of Galactic Systems in Light of the Magnesium Abundance in Field Stars: The Thick Disk | arXiv | 2005 | Link |
| Phase Transitions Patterns in Relativistic and Nonrelativistic Multi-Scalar-Field Models | arXiv | 2005 | Link |
| Stable Fermion Bag Solitons in the Massive Gross-Neveu Model: Inverse Scattering Analysis | arXiv | 2005 | Link |
2004
| Title | Venue | Year | Link |
|---|---|---|---|
| Quantum privacy amplification for quantum secure direct communication | arXiv | 2004 | Link |
2003
| Title | Venue | Year | Link |
|---|---|---|---|
| Optimum Probe Parameters for Entangling Probe in Quantum Key Distribution | arXiv | 2003 | Link |
2001
| Title | Venue | Year | Link |
|---|---|---|---|
| Chemical bonding, elasticity, and valence force field models: a case study for alpha-Pt_2Si and PtSi | arXiv | 2001 | Link |
| On quantum and approximate privacy | arXiv | 2001 | Link |
| Scale Invariant Markov Models for Bayesian Inversion of Linear Inverse Problems | arXiv | 2001 | Link |
| Search for the Lepton Number Violating Process nu_mu-bar e^- -> mu^- nu_e-bar | arXiv | 2001 | Link |
1999
| Title | Venue | Year | Link |
|---|---|---|---|
| An Exactly Soluble Hierarchical Clustering Model: Inverse Cascades, Self-Similarity, and Scaling | arXiv | 1999 | Link |
| Quantum Key Distribution using Two Coherent States of Light and their Superposition | arXiv | 1999 | Link |