Inversion Attacks

Table of Contents
IJCAI
AAAI
AISTATS
NeurIPS
ICML
ICLR
UAI
IEEE Trans. Pattern Anal. Mach. Intell.
KDD
SP
CCS
USENIX Security Symposium
NDSS
CVPR
ICCV
ECCV
ACM Multimedia
ACL
EMNLP
COLING
SIGIR
WWW
DAC
IEEE Trans. Computers
WACV
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.
IEEE Trans. Neural Networks Learn. Syst.
IEEE Trans. Big Data
IEEE Trans. Medical Imaging
IEEE Trans. Inf. Forensics Secur.
ACM Trans. Priv. Secur.
IEEE J. Biomed. Health Informatics
Medical Image Anal.
Knowl. Based Syst.
Neurocomputing
IEEE Trans. Knowl. Data Eng.
IEEE Trans. Syst. Man Cybern. Syst.
IEEE Trans. Emerg. Top. Comput.
Neural Networks
J. Artif. Intell. Res.
IEEE Trans. Image Process.
IEEE Trans. Neural Networks
IEEE Trans. Intell. Transp. Syst.
Expert Syst. Appl.
IEEE ACM Trans. Audio Speech Lang. Process.
IEEE Trans. Speech Audio Process.
Neural Comput. Appl.
ICDE
MobiCom
IEEE Symposium on Security and Privacy
CollSec
Proc. ACM Manag. Data
ICSE Companion
CIKM
ACM Trans. Intell. Syst. Technol.
ACM Trans. Knowl. Discov. Data
Proc. VLDB Endow.
IEEE Trans. Parallel Distributed Syst.
Pattern Recognit.
Inf. Sci.
IEEE Trans. Signal Process.
IEEE Trans. Cybern.
Pattern Recognit. Lett.
ACM Trans. Inf. Syst. Secur.
INFOCOM
Mach. Learn.
Int. J. Comput. Vis.
Comput. Vis. Image Underst.
arXiv

IJCAI

Expand IJCAI

2025

Title Venue Year Link
MMGIA: Gradient Inversion Attack Against Multimodal Federated Learning via Intermodal Correlation. IJCAI 2025 Link

2023

Title Venue Year Link
Boosting Decision-Based Black-Box Adversarial Attack with Gradient Priors. IJCAI 2023 Link

2022

Title Venue Year Link
A Survey on Gradient Inversion: Attacks, Defenses and Future Directions. IJCAI 2022 Link
Measuring Data Leakage in Machine-Learning Models with Fisher Information (Extended Abstract). IJCAI 2022 Link

2021

Title Venue Year Link
InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion. IJCAI 2021 Link

2015

Title Venue Year Link
Regression Model Fitting under Differential Privacy and Model Inversion Attack. IJCAI 2015 Link

1989

Title Venue Year Link
A "Small Leakage" Model for Diffusion Smoothing of Image Data. IJCAI 1989 Link

AAAI

Expand AAAI

2025

Title Venue Year Link
A New Federated Learning Framework Against Gradient Inversion Attacks. AAAI 2025 Link
A Sample-Level Evaluation and Generative Framework for Model Inversion Attacks. AAAI 2025 Link
Against All Odds: Overcoming Typology, Script, and Language Confusion in Multilingual Embedding Inversion Attacks. AAAI 2025 Link
AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples. AAAI 2025 Link

2024

Title Venue Year Link
Compositional Inversion for Stable Diffusion Models. AAAI 2024 Link
DreamStyler: Paint by Style Inversion with Text-to-Image Diffusion Models. AAAI 2024 Link
Foreseeing Reconstruction Quality of Gradient Inversion: An Optimization Perspective. AAAI 2024 Link
High-Fidelity Gradient Inversion in Distributed Learning. AAAI 2024 Link
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking. AAAI 2024 Link
Music Style Transfer with Time-Varying Inversion of Diffusion Models. AAAI 2024 Link
Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks. AAAI 2024 Link

2023

Title Venue Year Link
Let Graph Be the Go Board: Gradient-Free Node Injection Attack for Graph Neural Networks via Reinforcement Learning. AAAI 2023 Link
MGIA: Mutual Gradient Inversion Attack in Multi-Modal Federated Learning (Student Abstract). AAAI 2023 Link
Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network. AAAI 2023 Link

2022

Title Venue Year Link
Improved Gradient-Based Adversarial Attacks for Quantized Networks. AAAI 2022 Link

2021

Title Venue Year Link
Adversarial Training with Fast Gradient Projection Method against Synonym Substitution Based Text Attacks. AAAI 2021 Link
Beating Attackers At Their Own Games: Adversarial Example Detection Using Adversarial Gradient Directions. AAAI 2021 Link
Improving Robustness to Model Inversion Attacks via Mutual Information Regularization. AAAI 2021 Link

2020

Title Venue Year Link
A New Ensemble Adversarial Attack Powered by Long-Term Gradient Memories. AAAI 2020 Link

2013

Title Venue Year Link
Gradient Networks: Explicit Shape Matching Without Extracting Edges. AAAI 2013 Link

AISTATS

Expand AISTATS

2025

Title Venue Year Link
MEDUSA: Medical Data Under Shadow Attacks via Hybrid Model Inversion. AISTATS 2025 Link
Signal Recovery from Random Dot-Product Graphs under Local Differential Privacy. AISTATS 2025 Link

2021

Title Venue Year Link
Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks. AISTATS 2021 Link

NeurIPS

Expand NeurIPS

2024

Title Venue Year Link
BELM: Bidirectional Explicit Linear Multi-step Sampler for Exact Inversion in Diffusion Models. NeurIPS 2024 Link
DAGER: Exact Gradient Inversion for Large Language Models. NeurIPS 2024 Link
Gradient Cuff: Detecting Jailbreak Attacks on Large Language Models by Exploring Refusal Loss Landscapes. NeurIPS 2024 Link
Gradient-free Decoder Inversion in Latent Diffusion Models. NeurIPS 2024 Link
Pseudo-Private Data Guided Model Inversion Attacks. NeurIPS 2024 Link
ReMAP: Neural Model Reprogramming with Network Inversion and Retrieval-Augmented Mapping for Adaptive Motion Forecasting. NeurIPS 2024 Link
Reimagining Mutual Information for Enhanced Defense against Data Leakage in Collaborative Inference. NeurIPS 2024 Link
SPEAR: Exact Gradient Inversion of Batches in Federated Learning. NeurIPS 2024 Link
Trap-MID: Trapdoor-based Defense against Model Inversion Attacks. NeurIPS 2024 Link

2023

Title Venue Year Link
Label-Only Model Inversion Attacks via Knowledge Transfer. NeurIPS 2023 Link
Understanding Deep Gradient Leakage via Inversion Influence Functions. NeurIPS 2023 Link

2022

Title Venue Year Link
LAMP: Extracting Text from Gradients with Language Model Priors. NeurIPS 2022 Link
Learning to Generate Inversion-Resistant Model Explanations. NeurIPS 2022 Link
Recovering Private Text in Federated Learning of Language Models. NeurIPS 2022 Link
Towards Reasonable Budget Allocation in Untargeted Graph Structure Attacks via Gradient Debias. NeurIPS 2022 Link

2021

Title Venue Year Link
Catastrophic Data Leakage in Vertical Federated Learning. NeurIPS 2021 Link
Designing Counterfactual Generators using Deep Model Inversion. NeurIPS 2021 Link
Evaluating Gradient Inversion Attacks and Defenses in Federated Learning. NeurIPS 2021 Link
Gradient Inversion with Generative Image Prior. NeurIPS 2021 Link
Variational Model Inversion Attacks. NeurIPS 2021 Link

2020

Title Venue Year Link
Model Inversion Networks for Model-Based Optimization. NeurIPS 2020 Link
Robustness of Bayesian Neural Networks to Gradient-Based Attacks. NeurIPS 2020 Link

2018

Title Venue Year Link
Faithful Inversion of Generative Models for Effective Amortized Inference. NeurIPS 2018 Link

ICML

Expand ICML

2025

Title Venue Year Link
Gradient Inversion of Multimodal Models. ICML 2025 Link
How Contaminated Is Your Benchmark? Measuring Dataset Leakage in Large Language Models with Kernel Divergence. ICML 2025 Link
Smoothed Preference Optimization via ReNoise Inversion for Aligning Diffusion Models with Varied Human Preferences. ICML 2025 Link

2024

Title Venue Year Link
Differentially private exact recovery for stochastic block models. ICML 2024 Link
Referee Can Play: An Alternative Approach to Conditional Generation via Model Inversion. ICML 2024 Link
SignSGD with Federated Defense: Harnessing Adversarial Attacks through Gradient Sign Decoding. ICML 2024 Link
Single-Model Attribution of Generative Models Through Final-Layer Inversion. ICML 2024 Link
Sparse Model Inversion: Efficient Inversion of Vision Transformers for Data-Free Applications. ICML 2024 Link

2023

Title Venue Year Link
TabLeak: Tabular Data Leakage in Federated Learning. ICML 2023 Link

2022

Title Venue Year Link
An Equivalence Between Data Poisoning and Byzantine Gradient Attacks. ICML 2022 Link
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. ICML 2022 Link
Diversified Adversarial Attacks based on Conjugate Gradient Method. ICML 2022 Link
Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks. ICML 2022 Link
Plug-In Inversion: Model-Agnostic Inversion for Vision with Data Augmentations. ICML 2022 Link

2021

Title Venue Year Link
Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation. ICML 2021 Link

2020

Title Venue Year Link
Min-Max Optimization without Gradients: Convergence and Applications to Black-Box Evasion and Poisoning Attacks. ICML 2020 Link

ICLR

Expand ICLR

2025

Title Venue Year Link
Activation Gradient based Poisoned Sample Detection Against Backdoor Attacks. ICLR 2025 Link
ConcreTizer: Model Inversion Attack via Occupancy Classification and Dispersion Control for 3D Point Cloud Restoration. ICLR 2025 Link
Lightning-Fast Image Inversion and Editing for Text-to-Image Diffusion Models. ICLR 2025 Link
REFINE: Inversion-Free Backdoor Defense via Model Reprogramming. ICLR 2025 Link
Stealthy Shield Defense: A Conditional Mutual Information-Based Approach against Black-Box Model Inversion Attacks. ICLR 2025 Link
Visually Guided Decoding: Gradient-Free Hard Prompt Inversion with Language Models. ICLR 2025 Link

2024

Title Venue Year Link
Be Careful What You Smooth For: Label Smoothing Can Be a Privacy Shield but Also a Catalyst for Model Inversion Attacks. ICLR 2024 Link
Enhancing Transferable Adversarial Attacks on Vision Transformers through Gradient Normalization Scaling and High-Frequency Adaptation. ICLR 2024 Link
Language Model Inversion. ICLR 2024 Link
Towards Eliminating Hard Label Constraints in Gradient Inversion Attacks. ICLR 2024 Link

2022

Title Venue Year Link
Transferable Adversarial Attack based on Integrated Gradients. ICLR 2022 Link

2021

Title Venue Year Link
R-GAP: Recursive Gradient Attack on Privacy. ICLR 2021 Link

2020

Title Venue Year Link
Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks. ICLR 2020 Link

2018

Title Venue Year Link
Black-box Attacks on Deep Neural Networks via Gradient Estimation. ICLR 2018 Link

2013

Title Venue Year Link
Gradient Driven Learning for Pooling in Visual Pipeline Feature Extraction Models ICLR 2013 Link

UAI

Expand UAI

2023

Title Venue Year Link
Learning To Invert: Simple Adaptive Attacks for Gradient Inversion in Federated Learning. UAI 2023 Link

2021

Title Venue Year Link
Measuring data leakage in machine-learning models with Fisher information. UAI 2021 Link

IEEE Trans. Pattern Anal. Mach. Intell.

Expand IEEE Trans. Pattern Anal. Mach. Intell.

2025

Title Venue Year Link
Unknown-Aware Bilateral Dependency Optimization for Defending Against Model Inversion Attacks. IEEE Trans. Pattern Anal. Mach. Intell. 2025 Link

2024

Title Venue Year Link
Gradient Inversion Attacks: Impact Factors Analyses and Privacy Enhancement. IEEE Trans. Pattern Anal. Mach. Intell. 2024 Link

2023

Title Venue Year Link
Comprehensive Vulnerability Evaluation of Face Recognition Systems to Template Inversion Attacks via 3D Face Reconstruction. IEEE Trans. Pattern Anal. Mach. Intell. 2023 Link

2007

Title Venue Year Link
Normalization-Cooperated Gradient Feature Extraction for Handwritten Character Recognition. IEEE Trans. Pattern Anal. Mach. Intell. 2007 Link

1979

Title Venue Year Link
Image Feature Extraction Using Diameter-Limited Gradient Direction Histograms. IEEE Trans. Pattern Anal. Mach. Intell. 1979 Link

KDD

Expand KDD

2025

Title Venue Year Link
Prompt as a Double-Edged Sword: A Dynamic Equilibrium Gradient-Assigned Attack against Graph Prompt Learning. KDD 2025 Link

2022

Title Venue Year Link
Bilateral Dependency Optimization: Defending Against Model-inversion Attacks. KDD 2022 Link
LeapAttack: Hard-Label Adversarial Attack on Text via Gradient-Based Optimization. KDD 2022 Link

2011

Title Venue Year Link
Leakage in data mining: formulation, detection, and avoidance. KDD 2011 Link

SP

Expand SP

2025

Title Venue Year Link
Is MPC Secure? Leveraging Neural Network Classifiers to Detect Data Leakage Vulnerabilities in MPC Implementations. SP 2025 Link
Prompt Inversion Attack Against Collaborative Inference of Large Language Models. SP 2025 Link

2024

Title Venue Year Link
Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs. SP 2024 Link
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning. SP 2024 Link

2022

Title Venue Year Link
LINKTELLER: Recovering Private Edges from Graph Neural Networks via Influence Analysis. SP 2022 Link
Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation. SP 2022 Link

CCS

Expand CCS

2025

Title Venue Year Link
IOValve: Leakage-Free I/O Sandbox for Large-Scale Untrusted Data Processing. CCS 2025 Link

2024

Title Venue Year Link
Uncovering Gradient Inversion Risks in Practical Language Model Training. CCS 2024 Link

2021

Title Venue Year Link
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. CCS 2021 Link

2019

Title Venue Year Link
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing. CCS 2019 Link
Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality. CCS 2019 Link

2018

Title Venue Year Link
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. CCS 2018 Link
Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage. CCS 2018 Link

2016

Title Venue Year Link
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages. CCS 2016 Link

2015

Title Venue Year Link
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures. CCS 2015 Link

2013

Title Venue Year Link
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. CCS 2013 Link

2000

Title Venue Year Link
Threshold-based identity recovery for privacy enhanced applications. CCS 2000 Link

USENIX Security Symposium

Expand USENIX Security Symposium

2025

Title Venue Year Link
Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL Settings. USENIX Security Symposium 2025 Link
Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models. USENIX Security Symposium 2025 Link
Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning. USENIX Security Symposium 2025 Link
SoK: Gradient Inversion Attacks in Federated Learning. USENIX Security Symposium 2025 Link
SpeechGuard: Recoverable and Customizable Speech Privacy Protection. USENIX Security Symposium 2025 Link

2024

Title Venue Year Link
FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition. USENIX Security Symposium 2024 Link
Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage. USENIX Security Symposium 2024 Link
Length Leakage in Oblivious Data Access Mechanisms. USENIX Security Symposium 2024 Link
Secure Account Recovery for a Privacy-Preserving Web Service. USENIX Security Symposium 2024 Link
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases. USENIX Security Symposium 2024 Link

2022

Title Venue Year Link
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. USENIX Security Symposium 2022 Link

2021

Title Venue Year Link
Leakage of Dataset Properties in Multi-Party Machine Learning. USENIX Security Symposium 2021 Link

2020

Title Venue Year Link
Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis. USENIX Security Symposium 2020 Link
SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage. USENIX Security Symposium 2020 Link

NDSS

Expand NDSS

2025

Title Venue Year Link
CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling. NDSS 2025 Link
LeakLess: Selective Data Protection against Memory Leakage Attacks for Serverless Platforms. NDSS 2025 Link
Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction. NDSS 2025 Link

2024

Title Venue Year Link
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models. NDSS 2024 Link
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering. NDSS 2024 Link

2023

Title Venue Year Link
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes. NDSS 2023 Link

2022

Title Venue Year Link
MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity. NDSS 2022 Link

2019

Title Venue Year Link
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. NDSS 2019 Link

2015

Title Venue Year Link
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. NDSS 2015 Link

2013

Title Venue Year Link
OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance. NDSS 2013 Link

CVPR

Expand CVPR

2025

Title Venue Year Link
From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning. CVPR 2025 Link
Gradient Inversion Attacks on Parameter-Efficient Fine-Tuning. CVPR 2025 Link
InPO: Inversion Preference Optimization with Reparametrized DDIM for Efficient Diffusion Model Alignment. CVPR 2025 Link
Theoretical Insights in Model Inversion Robustness and Conditional Entropy Maximization for Collaborative Inference Systems. CVPR 2025 Link
Towards Effective and Sparse Adversarial Attack on Spiking Neural Networks via Breaking Invisible Surrogate Gradients. CVPR 2025 Link

2024

Title Venue Year Link
CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion. CVPR 2024 Link
Defense Against Adversarial Attacks on No-Reference Image Quality Models with Gradient Norm Regularization. CVPR 2024 Link
Dual-Consistency Model Inversion for Non-Exemplar Class Incremental Learning. CVPR 2024 Link
Inversion-Free Image Editing with Language-Guided Diffusion Models. CVPR 2024 Link
Localization is All You Evaluate: Data Leakage in Online Mapping Datasets and How to Fix it. CVPR 2024 Link
Model Inversion Robustness: Can Transfer Learning Help? CVPR 2024 Link
Prompting Hard or Hardly Prompting: Prompt Inversion for Text-to-Image Diffusion Models. CVPR 2024 Link

2023

Title Venue Year Link
Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack. CVPR 2023 Link
Efficient Loss Function by Minimizing the Detrimental Effect of Floating-Point Errors on Gradient-Based Attacks. CVPR 2023 Link
Inversion-based Style Transfer with Diffusion Models. CVPR 2023 Link
Null-text Inversion for Editing Real Images using Guided Diffusion Models. CVPR 2023 Link
Privacy-Preserving Representations are not Enough: Recovering Scene Content from Camera Poses. CVPR 2023 Link
Rate Gradient Approximation Attack Threats Deep Spiking Neural Networks. CVPR 2023 Link
Re-Thinking Model Inversion Attacks Against Deep Neural Networks. CVPR 2023 Link
Reinforcement Learning-Based Black-Box Model Inversion Attacks. CVPR 2023 Link
Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization. CVPR 2023 Link

2022

Title Venue Year Link
GradViT: Gradient Inversion of Vision Transformers. CVPR 2022 Link
Label-Only Model Inversion Attacks via Boundary Repulsion. CVPR 2022 Link
ResSFL: A Resistance Transfer Framework for Defending Model Inversion Attack in Split Federated Learning. CVPR 2022 Link
Robust Structured Declarative Classifiers for 3D Point Clouds: Defending Adversarial Attacks with Implicit Gradients. CVPR 2022 Link

2021

Title Venue Year Link
How Privacy-Preserving Are Line Clouds? Recovering Scene Details From 3D Lines. CVPR 2021 Link
IMAGINE: Image Synthesis by Image-Guided Model Inversion. CVPR 2021 Link
MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation. CVPR 2021 Link

2020

Title Venue Year Link
The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks. CVPR 2020 Link

2019

Title Venue Year Link
Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses. CVPR 2019 Link

2013

Title Venue Year Link
BFO Meets HOG: Feature Extraction Based on Histograms of Oriented p.d.f. Gradients for Image Classification. CVPR 2013 Link
Supervised Semantic Gradient Extraction Using Linear-Time Optimization. CVPR 2013 Link

ICCV

Expand ICCV

2023

Title Venue Year Link
Boosting Adversarial Transferability via Gradient Relevance Attack. ICCV 2023 Link
Controllable Inversion of Black-Box Face Recognition Models via Diffusion. ICCV 2023 Link
GIFD: A Generative Gradient Inversion Method with Feature Domain Optimization. ICCV 2023 Link
Generative Gradient Inversion via Over-Parameterized Networks in Federated Learning. ICCV 2023 Link
Hard No-Box Adversarial Attack on Skeleton-Based Human Action Recognition with Skeleton-Motion-Informed Gradient. ICCV 2023 Link
Prompt Tuning Inversion for Text-Driven Image Editing Using Diffusion Models. ICCV 2023 Link
TIJO: Trigger Inversion with Joint Optimization for Defending Multimodal Backdoored Models. ICCV 2023 Link
Template Inversion Attack against Face Recognition Systems using 3D Face Reconstruction. ICCV 2023 Link
Transferable Adversarial Attack for Both Vision Transformers and Convolutional Networks via Momentum Integrated Gradients. ICCV 2023 Link

2021

Title Venue Year Link
Exploiting Explanations for Model Inversion Attacks. ICCV 2021 Link
Knowledge-Enriched Distributional Model Inversion Attacks. ICCV 2021 Link
Meta Gradient Adversarial Attack. ICCV 2021 Link

2007

Title Venue Year Link
On the Extraction of Curve Skeletons using Gradient Vector Flow. ICCV 2007 Link

ECCV

Expand ECCV

2024

Title Venue Year Link
A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion Attacks. ECCV 2024 Link
Improving Robustness to Model Inversion Attacks via Sparse Coding Architectures. ECCV 2024 Link
Learning a Dynamic Privacy-Preserving Camera Robust to Inversion Attacks. ECCV 2024 Link
On the Vulnerability of Skip Connections to Model Inversion Attacks. ECCV 2024 Link
Prediction Exposes Your Face: Black-Box Model Inversion via Prediction Alignment. ECCV 2024 Link
Safeguard Text-to-Image Diffusion Models with Human Feedback Inversion. ECCV 2024 Link
Source Prompt Disentangled Inversion for Boosting Image Editability with Diffusion Models. ECCV 2024 Link
Viewpoint Textual Inversion: Discovering Scene Representations and 3D View Control in 2D Diffusion Models. ECCV 2024 Link

2022

Title Venue Year Link
SecretGen: Privacy Recovery on Pre-trained Models via Distribution Discrimination. ECCV 2022 Link

2020

Title Venue Year Link
Defense Against Adversarial Attacks via Controlling Gradient Leaking on Embedded Manifolds. ECCV 2020 Link

2008

Title Venue Year Link
Image Feature Extraction Using Gradient Local Auto-Correlations. ECCV 2008 Link

ACM Multimedia

Expand ACM Multimedia

2025

Title Venue Year Link
CapRecover: A Cross-Modality Feature Inversion Attack Framework on Vision Language Models. ACM Multimedia 2025 Link
Inversion-DPO: Precise and Efficient Post-Training for Diffusion Models. ACM Multimedia 2025 Link
MIG-COW: Transferable Adversarial Attacks on Deepfake Detectors via Gradient Decomposition. ACM Multimedia 2025 Link

2024

Title Venue Year Link
Informative Point cloud Dataset Extraction for Classification via Gradient-based Points Moving. ACM Multimedia 2024 Link

2023

Title Venue Year Link
Gradient-Free Textual Inversion. ACM Multimedia 2023 Link
Model Inversion Attack via Dynamic Memory Learning. ACM Multimedia 2023 Link

2020

Title Venue Year Link
Efficient Joint Gradient Based Attack Against SOR Defense for 3D Point Cloud Classification. ACM Multimedia 2020 Link

ACL

Expand ACL

2025

Title Venue Year Link
ALGEN: Few-shot Inversion Attacks on Textual Embeddings via Cross-Model Alignment and Generation. ACL 2025 Link
Mitigating Paraphrase Attacks on Machine-Text Detection via Paraphrase Inversion. ACL 2025 Link
ObfusLM: Privacy-preserving Language Model Service against Embedding Inversion Attacks. ACL 2025 Link
PIG: Privacy Jailbreak Attack on LLMs via Gradient-based Iterative In-Context Optimization. ACL 2025 Link
Stealing Training Data from Large Language Models in Decentralized Training through Activation Inversion Attack. ACL 2025 Link
The Inverse Scaling Effect of Pre-Trained Language Model Surprisal Is Not Due to Data Leakage. ACL 2025 Link

2024

Title Venue Year Link
Continual Few-shot Relation Extraction via Adaptive Gradient Correction and Knowledge Decomposition. ACL 2024 Link
Text Embedding Inversion Security for Multilingual Language Models. ACL 2024 Link
Towards Multiple References Era - Addressing Data Leakage and Limited Reference Diversity in Machine Translation Evaluation. ACL 2024 Link
Transferable Embedding Inversion Attack: Uncovering Privacy Risks in Text Embeddings without Model Queries. ACL 2024 Link

2023

Title Venue Year Link
A Gradient Control Method for Backdoor Attacks on Parameter-Efficient Tuning. ACL 2023 Link
Bridge the Gap Between CV and NLP! A Gradient-based Textual Adversarial Attack Framework. ACL 2023 Link
Sentence Embedding Leaks More Information than You Expect: Generative Embedding Inversion Attack to Recover the Whole Sentence. ACL 2023 Link

EMNLP

Expand EMNLP

2025

Title Venue Year Link
Investigating How Pre-training Data Leakage Affects Models' Reproduction and Detection Capabilities. EMNLP 2025 Link
Reverse Prompt Engineering: A Zero-Shot, Genetic Algorithm Approach to Language Model Inversion. EMNLP 2025 Link
Semantic Inversion, Identical Replies: Revisiting Negation Blindness in Large Language Models. EMNLP 2025 Link

2024

Title Venue Year Link
An Inversion Attack Against Obfuscated Embedding Matrix in Language Model Inference. EMNLP 2024 Link
On Leakage of Code Generation Evaluation Datasets. EMNLP 2024 Link
OpenSep: Leveraging Large Language Models with Textual Inversion for Open World Audio Separation. EMNLP 2024 Link
SecureSQL: Evaluating Data Leakage of Large Language Models as Natural Language Interfaces to Databases. EMNLP 2024 Link
Seeing the Forest through the Trees: Data Leakage from Partial Transformer Gradients. EMNLP 2024 Link

2023

Title Venue Year Link
UPTON: Preventing Authorship Leakage from Public Text Release via Data Poisoning. EMNLP 2023 Link

2022

Title Venue Year Link
Backdoor Attacks in Federated Learning by Rare Embeddings and Gradient Ensembling. EMNLP 2022 Link
Invernet: An Inversion Attack Framework to Infer Fine-Tuning Datasets through Word Embeddings. EMNLP 2022 Link

2021

Title Venue Year Link
Gradient Imitation Reinforcement Learning for Low Resource Relation Extraction. EMNLP 2021 Link
Gradient-based Adversarial Attacks against Text Transformers. EMNLP 2021 Link
TAG: Gradient Attack on Transformer-based Language Models. EMNLP 2021 Link

COLING

Expand COLING

2025

Title Venue Year Link
Gradient Inversion Attack in Federated Learning: Exposing Text Data through Discrete Optimization. COLING 2025 Link

2012

Title Venue Year Link
Code-Switch Language Model with Inversion Constraints for Mixed Language Speech Recognition. COLING 2012 Link

1986

Title Venue Year Link
The Role of Inversion and PP-Fronting in Relating Discourse Elements: some implications for cognitive and computational models of Natural Language Processing. COLING 1986 Link

SIGIR

Expand SIGIR

2025

Title Venue Year Link
Information Leakage of Sentence Embeddings via Generative Embedding Inversion Attacks. SIGIR 2025 Link

WWW

Expand WWW

2024

Title Venue Year Link
Detecting Poisoning Attacks on Federated Learning Using Gradient-Weighted Class Activation Mapping. WWW 2024 Link

2023

Title Venue Year Link
Ginver: Generative Model Inversion Attacks Against Collaborative Inference. WWW 2023 Link
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples. WWW 2023 Link

2019

Title Venue Year Link
UNVEIL: Capture and Visualise WiFi Data Leakages. WWW 2019 Link
VACCINE: Using Contextual Integrity For Data Leakage Detection. WWW 2019 Link

2017

Title Venue Year Link
Trajectory Recovery From Ash: User Privacy Is NOT Preserved in Aggregated Mobility Data. WWW 2017 Link

DAC

Expand DAC

2025

Title Venue Year Link
Data Oblivious CPU: Microarchitectural Side-channel Leakage-Resilient Processor. DAC 2025 Link
Ensembler: Protect Collaborative Inference Privacy from Model Inversion Attack via Selective Ensemble. DAC 2025 Link

2023

Title Venue Year Link
NNTesting: Neural Network Fault Attacks Detection Using Gradient-Based Test Vector Generation. DAC 2023 Link

2021

Title Venue Year Link
PRID: Model Inversion Privacy Attacks in Hyperdimensional Learning Systems. DAC 2021 Link

IEEE Trans. Computers

Expand IEEE Trans. Computers

2021

Title Venue Year Link
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control. IEEE Trans. Computers 2021 Link

2000

Title Venue Year Link
Generalized Inversion Attack on Nonlinear Filter Generators. IEEE Trans. Computers 2000 Link

WACV

Expand WACV

2025

Title Venue Year Link
Negative-Prompt Inversion: Fast Image Inversion for Editing with Text-Guided Diffusion Models. WACV 2025 Link
Recoverable Anonymization for Pose Estimation: A Privacy-Enhancing Approach. WACV 2025 Link

2024

Title Venue Year Link
PATROL: Privacy-Oriented Pruning for Collaborative Inference Against Model Inversion Attacks. WACV 2024 Link

2022

Title Venue Year Link
Reconstructing Training Data from Diverse ML Models by Ensemble Inversion. WACV 2022 Link

2019

Title Venue Year Link
Local Gradients Smoothing: Defense Against Localized Adversarial Attacks. WACV 2019 Link

2008

Title Venue Year Link
Iris Extraction Based on Intensity Gradient and Texture Difference. WACV 2008 Link

IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.

Expand IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.

2000

Title Venue Year Link
SPICE models for flicker noise in n-MOSFETs from subthreshold tostrong inversion. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2000 Link

1992

Title Venue Year Link
A mobility model including the screening effect in MOS inversion layer. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 1992 Link

1989

Title Venue Year Link
Extracting transistor changes from device simulations by gradient fitting. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 1989 Link
Universality of mobility-gate field characteristics of electrons in the inversion charge layer and its application in MOSFET modeling. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 1989 Link

IEEE Trans. Neural Networks Learn. Syst.

Expand IEEE Trans. Neural Networks Learn. Syst.

2025

Title Venue Year Link
Defending Against Neural Network Model Inversion Attacks via Data Poisoning. IEEE Trans. Neural Networks Learn. Syst. 2025 Link
Neural Honeypoint: An Active Defense Framework Against Model Inversion Attacks. IEEE Trans. Neural Networks Learn. Syst. 2025 Link

2024

Title Venue Year Link
A Dynamic-Varying Parameter Enhanced ZNN Model for Solving Time-Varying Complex-Valued Tensor Inversion With Its Application to Image Encryption. IEEE Trans. Neural Networks Learn. Syst. 2024 Link
GNN Model for Time-Varying Matrix Inversion With Robust Finite-Time Convergence. IEEE Trans. Neural Networks Learn. Syst. 2024 Link
Gradient Correction for White-Box Adversarial Attacks. IEEE Trans. Neural Networks Learn. Syst. 2024 Link

2023

Title Venue Year Link
Dynamic Moore-Penrose Inversion With Unknown Derivatives: Gradient Neural Network Approach. IEEE Trans. Neural Networks Learn. Syst. 2023 Link
Exploring Adversarial Attack in Spiking Neural Networks With Spike-Compatible Gradient. IEEE Trans. Neural Networks Learn. Syst. 2023 Link

2022

Title Venue Year Link
SMGEA: A New Ensemble Adversarial Attack Powered by Long-Term Gradient Memories. IEEE Trans. Neural Networks Learn. Syst. 2022 Link

2021

Title Venue Year Link
Gradients Cannot Be Tamed: Behind the Impossible Paradox of Blocking Targeted Adversarial Attacks. IEEE Trans. Neural Networks Learn. Syst. 2021 Link

2020

Title Venue Year Link
New Varying-Parameter ZNN Models With Finite-Time Convergence and Noise Suppression for Time-Varying Matrix Moore-Penrose Inversion. IEEE Trans. Neural Networks Learn. Syst. 2020 Link

2013

Title Venue Year Link
Common Nature of Learning Between Back-Propagation and Hopfield-Type Neural Networks for Generalized Matrix Inversion With Simplified Models. IEEE Trans. Neural Networks Learn. Syst. 2013 Link

IEEE Trans. Big Data

Expand IEEE Trans. Big Data

2025

Title Venue Year Link
Comprehensive Privacy Analysis on Recommendation With Causal Embedding Against Model Inversion Attacks. IEEE Trans. Big Data 2025 Link

2024

Title Venue Year Link
Augmented Multi-Party Computation Against Gradient Leakage in Federated Learning. IEEE Trans. Big Data 2024 Link
Improved Gradient Inversion Attacks and Defenses in Federated Learning. IEEE Trans. Big Data 2024 Link

2023

Title Venue Year Link
A Black-Box Adversarial Attack Method via Nesterov Accelerated Gradient and Rewiring Towards Attacking Graph Neural Networks. IEEE Trans. Big Data 2023 Link

2021

Title Venue Year Link
Leakage Resilient Leveled FHE on Multiple Bits Message. IEEE Trans. Big Data 2021 Link

IEEE Trans. Medical Imaging

Expand IEEE Trans. Medical Imaging

2023

Title Venue Year Link
Do Gradient Inversion Attacks Make Federated Learning Unsafe? IEEE Trans. Medical Imaging 2023 Link
Ensemble Inversion for Brain Tumor Growth Models With Mass Effect. IEEE Trans. Medical Imaging 2023 Link

2016

Title Venue Year Link
Real-Time Model-Based Inversion in Cross-Sectional Optoacoustic Tomography. IEEE Trans. Medical Imaging 2016 Link

2015

Title Venue Year Link
Quantitative Susceptibility Mapping by Inversion of a Perturbation Field Model: Correlation With Brain Iron in Normal Aging. IEEE Trans. Medical Imaging 2015 Link

2014

Title Venue Year Link
Model Based Inversion for Deriving Maps of Histological Parameters Characteristic of Cancer From Ex-Vivo Multispectral Images of the Colon. IEEE Trans. Medical Imaging 2014 Link

2010

Title Venue Year Link
Fast Semi-Analytical Model-Based Acoustic Inversion for Quantitative Optoacoustic Tomography. IEEE Trans. Medical Imaging 2010 Link

IEEE Trans. Inf. Forensics Secur.

Expand IEEE Trans. Inf. Forensics Secur.

2025

Title Venue Year Link
Adv-Inversion: Stealthy Adversarial Attacks via GAN-Inversion for Facial Privacy Protection. IEEE Trans. Inf. Forensics Secur. 2025 Link
Defending Against Model Inversion Attack via Feature Purification. IEEE Trans. Inf. Forensics Secur. 2025 Link
Distributional Black-Box Model Inversion Attack With Multi-Agent Reinforcement Learning. IEEE Trans. Inf. Forensics Secur. 2025 Link
Dual Dependency Disentangling for Defending Model Inversion Attacks in Split Federated Learning. IEEE Trans. Inf. Forensics Secur. 2025 Link
Enabling Gradient Inversion Attack Against SplitFed Learning via L2 Norm Amplification. IEEE Trans. Inf. Forensics Secur. 2025 Link
FGMIA: Feature-Guided Model Inversion Attacks Against Face Recognition Models. IEEE Trans. Inf. Forensics Secur. 2025 Link
GI-NAS: Boosting Gradient Inversion Attacks Through Adaptive Neural Architecture Search. IEEE Trans. Inf. Forensics Secur. 2025 Link
Gradient Inversion of Text-Modal Data in Distributed Learning. IEEE Trans. Inf. Forensics Secur. 2025 Link
Query-Efficient Model Inversion Attacks: An Information Flow View. IEEE Trans. Inf. Forensics Secur. 2025 Link
Recovering Reed-Solomon Codes Privately. IEEE Trans. Inf. Forensics Secur. 2025 Link
Robust Token Gradient and Frequency-Aware Transferable Adversarial Attacks on Vision Transformers. IEEE Trans. Inf. Forensics Secur. 2025 Link
Semantic and Precise Trigger Inversion: Detecting Backdoored Language Models. IEEE Trans. Inf. Forensics Secur. 2025 Link
The Gradient Puppeteer: Adversarial Domination in Gradient Leakage Attacks Through Model Poisoning. IEEE Trans. Inf. Forensics Secur. 2025 Link
TrapNet: Model Inversion Defense via Trapdoor. IEEE Trans. Inf. Forensics Secur. 2025 Link

2024

Title Venue Year Link
Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing. IEEE Trans. Inf. Forensics Secur. 2024 Link
Data Generation and Augmentation Method for Deep Learning-Based VDU Leakage Signal Restoration Algorithm. IEEE Trans. Inf. Forensics Secur. 2024 Link
Gradient-Leaks: Enabling Black-Box Membership Inference Attacks Against Machine Learning Models. IEEE Trans. Inf. Forensics Secur. 2024 Link
Inversion-Guided Defense: Detecting Model Stealing Attacks by Output Inverting. IEEE Trans. Inf. Forensics Secur. 2024 Link
RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks. IEEE Trans. Inf. Forensics Secur. 2024 Link
Unstoppable Attack: Label-Only Model Inversion Via Conditional Diffusion Model. IEEE Trans. Inf. Forensics Secur. 2024 Link
Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion Attack. IEEE Trans. Inf. Forensics Secur. 2024 Link

2023

Title Venue Year Link
A GAN-Based Defense Framework Against Model Inversion Attacks. IEEE Trans. Inf. Forensics Secur. 2023 Link
Analysis and Utilization of Hidden Information in Model Inversion Attacks. IEEE Trans. Inf. Forensics Secur. 2023 Link
EGIA: An External Gradient Inversion Attack in Federated Learning. IEEE Trans. Inf. Forensics Secur. 2023 Link
Label-Only Model Inversion Attacks: Attack With the Least Information. IEEE Trans. Inf. Forensics Secur. 2023 Link
Privacy-Encoded Federated Learning Against Gradient-Based Data Reconstruction Attacks. IEEE Trans. Inf. Forensics Secur. 2023 Link
Using Highly Compressed Gradients in Federated Learning for Data Reconstruction Attacks. IEEE Trans. Inf. Forensics Secur. 2023 Link

2022

Title Venue Year Link
Data Disclosure With Non-Zero Leakage and Non-Invertible Leakage Matrix. IEEE Trans. Inf. Forensics Secur. 2022 Link
Gradient Leakage Attack Resilient Deep Learning. IEEE Trans. Inf. Forensics Secur. 2022 Link
Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System. IEEE Trans. Inf. Forensics Secur. 2022 Link

2019

Title Venue Year Link
Impact of Prior Knowledge and Data Correlation on Privacy Leakage: A Unified Analysis. IEEE Trans. Inf. Forensics Secur. 2019 Link

2017

Title Venue Year Link
A Zero-Leakage Fuzzy Embedder From the Theoretical Formulation to Real Data. IEEE Trans. Inf. Forensics Secur. 2017 Link
Optimized Quantization in Zero Leakage Helper Data Systems. IEEE Trans. Inf. Forensics Secur. 2017 Link

ACM Trans. Priv. Secur.

Expand ACM Trans. Priv. Secur.

2025

Title Venue Year Link
Quantifying and Exploiting Adversarial Vulnerability: Gradient-Based Input Pre-Filtering for Enhanced Performance in Black-Box Attacks. ACM Trans. Priv. Secur. 2025 Link

2023

Title Venue Year Link
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks. ACM Trans. Priv. Secur. 2023 Link

IEEE J. Biomed. Health Informatics

Expand IEEE J. Biomed. Health Informatics

2023

Title Venue Year Link
E2EGI: End-to-End Gradient Inversion in Federated Learning. IEEE J. Biomed. Health Informatics 2023 Link

Medical Image Anal.

Expand Medical Image Anal.

2026

Title Venue Year Link
A novel gradient inversion attack framework to investigate privacy vulnerabilities during retinal image-based federated learning. Medical Image Anal. 2026 Link

2025

Title Venue Year Link
Shadow defense against gradient inversion attack in federated learning. Medical Image Anal. 2025 Link

Knowl. Based Syst.

Expand Knowl. Based Syst.

2025

Title Venue Year Link
Stand-in Model Protection: Synthetic defense for membership inference and model inversion attacks. Knowl. Based Syst. 2025 Link
Subspectrum mixup-based adversarial attack and evading defenses by structure-enhanced gradient purification. Knowl. Based Syst. 2025 Link

2024

Title Venue Year Link
AGS: Transferable adversarial attack for person re-identification by adaptive gradient similarity attack. Knowl. Based Syst. 2024 Link
Defending against gradient inversion attacks in federated learning via statistical machine unlearning. Knowl. Based Syst. 2024 Link
Spatial-frequency gradient fusion based model augmentation for high transferability adversarial attack. Knowl. Based Syst. 2024 Link

2023

Title Venue Year Link
MP-CLF: An effective Model-Preserving Collaborative deep Learning Framework for mitigating data leakage under the GAN. Knowl. Based Syst. 2023 Link

2017

Title Venue Year Link
Data leakage detection algorithm based on task sequences and probabilities. Knowl. Based Syst. 2017 Link

Neurocomputing

Expand Neurocomputing

2025

Title Venue Year Link
Exploiting the connections between images and deep feature vectors in model inversion attacks. Neurocomputing 2025 Link
Label-only model inversion attacks: Adaptive boundary exclusion for limited queries. Neurocomputing 2025 Link
Momentum gradient-based untargeted poisoning attack on hypergraph neural networks. Neurocomputing 2025 Link

2024

Title Venue Year Link
Adaptive Gradient-based Word Saliency for adversarial text attacks. Neurocomputing 2024 Link
Improved gradient leakage attack against compressed gradients in federated learning. Neurocomputing 2024 Link

2020

Title Venue Year Link
Modified gradient neural networks for solving the time-varying Sylvester equation with adaptive coefficients and elimination of matrix inversion. Neurocomputing 2020 Link
New error function designs for finite-time ZNN models with application to dynamic matrix inversion. Neurocomputing 2020 Link

2015

Title Venue Year Link
On sampled-data control for stabilization of genetic regulatory networks with leakage delays. Neurocomputing 2015 Link

IEEE Trans. Knowl. Data Eng.

Expand IEEE Trans. Knowl. Data Eng.

2025

Title Venue Year Link
Practical Equi-Join Over Encrypted Database With Reduced Leakage. IEEE Trans. Knowl. Data Eng. 2025 Link

2024

Title Venue Year Link
On Data Distribution Leakage in Cross-Silo Federated Learning. IEEE Trans. Knowl. Data Eng. 2024 Link

2023

Title Venue Year Link
Model Inversion Attacks Against Graph Neural Networks. IEEE Trans. Knowl. Data Eng. 2023 Link
Reveal Your Images: Gradient Leakage Attack Against Unbiased Sampling-Based Secure Aggregation. IEEE Trans. Knowl. Data Eng. 2023 Link
Time-Aware Gradient Attack on Dynamic Network Link Prediction. IEEE Trans. Knowl. Data Eng. 2023 Link

2011

Title Venue Year Link
Data Leakage Detection. IEEE Trans. Knowl. Data Eng. 2011 Link

IEEE Trans. Syst. Man Cybern. Syst.

Expand IEEE Trans. Syst. Man Cybern. Syst.

2023

Title Venue Year Link
Adversarial Attacks on Regression Systems via Gradient Optimization. IEEE Trans. Syst. Man Cybern. Syst. 2023 Link
Social IoT Approach to Cyber Defense of a Deep-Learning-Based Recognition System in Front of Media Clones Generated by Model Inversion Attack. IEEE Trans. Syst. Man Cybern. Syst. 2023 Link

IEEE Trans. Emerg. Top. Comput.

Expand IEEE Trans. Emerg. Top. Comput.

2023

Title Venue Year Link
A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs. IEEE Trans. Emerg. Top. Comput. 2023 Link

2022

Title Venue Year Link
An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks. IEEE Trans. Emerg. Top. Comput. 2022 Link

Neural Networks

Expand Neural Networks

2024

Title Venue Year Link
Aligning the domains in cross domain model inversion attack. Neural Networks 2024 Link
Structural prior-driven feature extraction with gradient-momentum combined optimization for convolutional neural network image classification. Neural Networks 2024 Link

2019

Title Venue Year Link
A new noise-tolerant and predefined-time ZNN model for time-dependent matrix inversion. Neural Networks 2019 Link

2007

Title Venue Year Link
Model inversion by parameter fit using NN emulating the forward model - Evaluation of indirect measurements. Neural Networks 2007 Link

J. Artif. Intell. Res.

Expand J. Artif. Intell. Res.

2025

Title Venue Year Link
Detecting Generative Model Inversion Attacks for Protecting Intellectual Property of Deep Neural Networks. J. Artif. Intell. Res. 2025 Link

IEEE Trans. Image Process.

Expand IEEE Trans. Image Process.

2021

Title Venue Year Link
Gradient-Based Feature Extraction From Raw Bayer Pattern Images. IEEE Trans. Image Process. 2021 Link

2003

Title Venue Year Link
A local spectral inversion of a linearized TV model for denoising and deblurring. IEEE Trans. Image Process. 2003 Link

1992

Title Venue Year Link
A system model and inversion for synthetic aperture radar imaging. IEEE Trans. Image Process. 1992 Link

IEEE Trans. Neural Networks

Expand IEEE Trans. Neural Networks

2005

Title Venue Year Link
Design and analysis of a general recurrent neural network model for time-varying matrix inversion. IEEE Trans. Neural Networks 2005 Link

IEEE Trans. Intell. Transp. Syst.

Expand IEEE Trans. Intell. Transp. Syst.

2022

Title Venue Year Link
Optimal Trajectory Planning and Robust Tracking Using Vehicle Model Inversion. IEEE Trans. Intell. Transp. Syst. 2022 Link

Expert Syst. Appl.

Expand Expert Syst. Appl.

2026

Title Venue Year Link
ExSGD: Exploiting previous gradient for distributed large-batch training of building extraction network. Expert Syst. Appl. 2026 Link
FMGHA: Future momentum gradient-based attack on hypergraph neural networks. Expert Syst. Appl. 2026 Link
Transferable and defense-aware dual-objective meta gradient memory attack against deepfake generation. Expert Syst. Appl. 2026 Link

2025

Title Venue Year Link
ILAMP: Improved text extraction from gradients in federated learning using language model priors and sequence beam search. Expert Syst. Appl. 2025 Link
Uni-3DAD: Gan-inversion aided universal 3D anomaly detection on model-free products. Expert Syst. Appl. 2025 Link
You cannot handle the weather: Progressive amplified adverse-weather-gradient projection adversarial attack. Expert Syst. Appl. 2025 Link

2024

Title Venue Year Link
AGD-GAN: Adaptive Gradient-Guided and Depth-supervised generative adversarial networks for ancient mural sketch extraction. Expert Syst. Appl. 2024 Link
Fixed-time convergence ZNN model for solving rectangular dynamic full-rank matrices inversion. Expert Syst. Appl. 2024 Link
Securecipher: An instantaneous synchronization stream encryption system for insider threat data leakage protection. Expert Syst. Appl. 2024 Link

2023

Title Venue Year Link
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability. Expert Syst. Appl. 2023 Link
Opt-TCAE: Optimal temporal convolutional auto-encoder for boiler tube leakage detection in a thermal power plant using multi-sensor data. Expert Syst. Appl. 2023 Link

2016

Title Venue Year Link
Ridders algorithm in approximate inversion of fuzzy model with parametrized consequences. Expert Syst. Appl. 2016 Link

2014

Title Venue Year Link
Inversion mechanism with functional extrema model for identification incommensurate and hyper fractional chaos via differential evolution. Expert Syst. Appl. 2014 Link

IEEE ACM Trans. Audio Speech Lang. Process.

Expand IEEE ACM Trans. Audio Speech Lang. Process.

2022

Title Venue Year Link
Acoustic-to-Articulatory Mapping With Joint Optimization of Deep Speech Enhancement and Articulatory Inversion Models. IEEE ACM Trans. Audio Speech Lang. Process. 2022 Link

IEEE Trans. Speech Audio Process.

Expand IEEE Trans. Speech Audio Process.

2013

Title Venue Year Link
Model-Based Inversion of Dynamic Range Compression. IEEE Trans. Speech Audio Process. 2013 Link

Neural Comput. Appl.

Expand Neural Comput. Appl.

2025

Title Venue Year Link
Integrated gradients-based defense against adversarial word substitution attacks. Neural Comput. Appl. 2025 Link

2016

Title Venue Year Link
The stabilization of BAM neural networks with time-varying delays in the leakage terms via sampled-data control. Neural Comput. Appl. 2016 Link

2012

Title Venue Year Link
A novel neural-based model for acoustic-articulatory inversion mapping. Neural Comput. Appl. 2012 Link

ICDE

Expand ICDE

2024

Title Venue Year Link
LDPRecover: Recovering Frequencies from Poisoning Attacks Against Local Differential Privacy. ICDE 2024 Link
Secure Normal Form: Mediation Among Cross Cryptographic Leakages in Encrypted Databases. ICDE 2024 Link

2020

Title Venue Year Link
An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs. ICDE 2020 Link

2009

Title Venue Year Link
A Model for Data Leakage Detection. ICDE 2009 Link

2005

Title Venue Year Link
XGuard: A System for Publishing XML Documents without Information Leakage in the Presence of Data Inference. ICDE 2005 Link

MobiCom

Expand MobiCom

2024

Title Venue Year Link
A Black-Box Approach for Quantifying Leakage of Trace-Based Correlated Data. MobiCom 2024 Link

IEEE Symposium on Security and Privacy

Expand IEEE Symposium on Security and Privacy

2019

Title Venue Year Link
Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage. IEEE Symposium on Security and Privacy 2019 Link
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps. IEEE Symposium on Security and Privacy 2019 Link

2018

Title Venue Year Link
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. IEEE Symposium on Security and Privacy 2018 Link

CollSec

Expand CollSec

2010

Title Venue Year Link
Analyzing Group Communication for Preventing Accidental Data Leakage via Email. CollSec 2010 Link

Proc. ACM Manag. Data

Expand Proc. ACM Manag. Data

2024

Title Venue Year Link
Counterfactual Explanation at Will, with Zero Privacy Leakage. Proc. ACM Manag. Data 2024 Link

2023

Title Venue Year Link
RLS Side Channels: Investigating Leakage of Row-Level Security Protected Data Through Query Execution Time. Proc. ACM Manag. Data 2023 Link

ICSE Companion

Expand ICSE Companion

2025

Title Venue Year Link
CODEMORPH: Mitigating Data Leakage in Large Language Model Assessment. ICSE Companion 2025 Link

CIKM

Expand CIKM

2022

Title Venue Year Link
Are Gradients on Graph Structure Reliable in Gray-box Attacks? CIKM 2022 Link

2005

Title Venue Year Link
Privacy leakage in multi-relational databases via pattern based semi-supervised learning. CIKM 2005 Link

ACM Trans. Intell. Syst. Technol.

Expand ACM Trans. Intell. Syst. Technol.

2022

Title Venue Year Link
GRNN: Generative Regression Neural Network - A Data Leakage Attack for Federated Learning. ACM Trans. Intell. Syst. Technol. 2022 Link

ACM Trans. Knowl. Discov. Data

Expand ACM Trans. Knowl. Discov. Data

2012

Title Venue Year Link
Leakage in data mining: Formulation, detection, and avoidance. ACM Trans. Knowl. Discov. Data 2012 Link

Proc. VLDB Endow.

Expand Proc. VLDB Endow.

2024

Title Venue Year Link
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores. Proc. VLDB Endow. 2024 Link

2022

Title Venue Year Link
Don't Be a Tattle-Tale: Preventing Leakages through Data Dependencies on Access Control Protected Data. Proc. VLDB Endow. 2022 Link

2018

Title Venue Year Link
ConTPL: Controlling Temporal Privacy Leakage in Differentially Private Continuous Data Release. Proc. VLDB Endow. 2018 Link

IEEE Trans. Parallel Distributed Syst.

Expand IEEE Trans. Parallel Distributed Syst.

2013

Title Venue Year Link
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud. IEEE Trans. Parallel Distributed Syst. 2013 Link

1990

Title Venue Year Link
Error Recovery in Shared Memory Multiprocessors Using Private Caches. IEEE Trans. Parallel Distributed Syst. 1990 Link

Pattern Recognit.

Expand Pattern Recognit.

2026

Title Venue Year Link
Global aggregated gradient-guided adversarial attacks for person re-identification. Pattern Recognit. 2026 Link
SemiSketch: An ancient mural sketch extraction network based on reference prior and gradient frequency compensation. Pattern Recognit. 2026 Link
Staircase Sign Method: Boosting adversarial attacks by mitigating gradient distortion. Pattern Recognit. 2026 Link

2025

Title Venue Year Link
Gradient-based sparse voxel attacks on point cloud object detection. Pattern Recognit. 2025 Link

2023

Title Venue Year Link
A Learnable Gradient operator for face presentation attack detection. Pattern Recognit. 2023 Link

2022

Title Venue Year Link
Practical protection against video data leakage via universal adversarial head. Pattern Recognit. 2022 Link

2021

Title Venue Year Link
AG3line: Active grouping and geometry-gradient combined validation for fast line segment extraction. Pattern Recognit. 2021 Link

2013

Title Venue Year Link
Rotation invariant textural feature extraction for image retrieval using eigen value analysis of intensity gradients and multi-resolution analysis. Pattern Recognit. 2013 Link

2003

Title Venue Year Link
Gradient feature extraction for classification-based face detection. Pattern Recognit. 2003 Link

1996

Title Venue Year Link
Extracting facial features by an inhibitory mechanism based on gradient distributions. Pattern Recognit. 1996 Link

Inf. Sci.

Expand Inf. Sci.

2025

Title Venue Year Link
Graph neural networks adversarial attacks based on node gradient and importance score. Inf. Sci. 2025 Link

2024

Title Venue Year Link
GradDiff: Gradient-based membership inference attacks against federated distillation with differential comparison. Inf. Sci. 2024 Link

2021

Title Venue Year Link
Improving adversarial attacks on deep neural networks via constricted gradient-based perturbations. Inf. Sci. 2021 Link
Target attack on biomedical image segmentation model based on multi-scale gradients. Inf. Sci. 2021 Link

2017

Title Venue Year Link
Local gradient patterns (LGP): An effective local-statistical-feature extraction scheme for no-reference image quality assessment. Inf. Sci. 2017 Link

2014

Title Venue Year Link
CoBAn: A context based model for data leakage prevention. Inf. Sci. 2014 Link

IEEE Trans. Signal Process.

Expand IEEE Trans. Signal Process.

2023

Title Venue Year Link
Secure Distributed Optimization Under Gradient Attacks. IEEE Trans. Signal Process. 2023 Link

2020

Title Venue Year Link
Federated Variance-Reduced Stochastic Gradient Descent With Robustness to Byzantine Attacks. IEEE Trans. Signal Process. 2020 Link

2019

Title Venue Year Link
Distributed Gradient Descent Algorithm Robust to an Arbitrary Number of Byzantine Attackers. IEEE Trans. Signal Process. 2019 Link
Gradient Algorithms for Complex Non-Gaussian Independent Component/Vector Extraction, Question of Convergence. IEEE Trans. Signal Process. 2019 Link

IEEE Trans. Cybern.

Expand IEEE Trans. Cybern.

2023

Title Venue Year Link
Deep Cascade Gradient RBF Networks With Output-Relevant Feature Extraction and Adaptation for Nonlinear and Nonstationary Processes. IEEE Trans. Cybern. 2023 Link

Pattern Recognit. Lett.

Expand Pattern Recognit. Lett.

2020

Title Venue Year Link
Perturbation analysis of gradient-based adversarial attacks. Pattern Recognit. Lett. 2020 Link

2015

Title Venue Year Link
Gradient operators for feature extraction from omnidirectional panoramic images. Pattern Recognit. Lett. 2015 Link

2013

Title Venue Year Link
Object extraction from T2 weighted brain MR image using histogram based gradient calculation. Pattern Recognit. Lett. 2013 Link

2010

Title Venue Year Link
Gradient operators for feature extraction and characterisation in range images. Pattern Recognit. Lett. 2010 Link

2008

Title Venue Year Link
Boundary extraction of linear features using dual paths through gradient profiles. Pattern Recognit. Lett. 2008 Link
Gradient-based local affine invariant feature extraction for mobile robot localization in indoor environments. Pattern Recognit. Lett. 2008 Link

ACM Trans. Inf. Syst. Secur.

Expand ACM Trans. Inf. Syst. Secur.

2004

Title Venue Year Link
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). ACM Trans. Inf. Syst. Secur. 2004 Link

INFOCOM

Expand INFOCOM

2025

Title Venue Year Link
VaniKG: Vanishing Key Gradient Attack and Defense for Robust Federated Aggregation. INFOCOM 2025 Link

2023

Title Venue Year Link
Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients. INFOCOM 2023 Link

2022

Title Venue Year Link
Protect Privacy from Gradient Leakage Attack in Federated Learning. INFOCOM 2022 Link

Mach. Learn.

Expand Mach. Learn.

2025

Title Venue Year Link
HFIA: a parasitic feature inference attack and gradient-based defense strategy in SplitNN-based vertical federated learning. Mach. Learn. 2025 Link

Int. J. Comput. Vis.

Expand Int. J. Comput. Vis.

2020

Title Venue Year Link
Scaling up the Randomized Gradient-Free Adversarial Attack Reveals Overestimation of Robustness Using Established Attacks. Int. J. Comput. Vis. 2020 Link

Comput. Vis. Image Underst.

Expand Comput. Vis. Image Underst.

2023

Title Venue Year Link
Improving the robustness of adversarial attacks using an affine-invariant gradient estimator. Comput. Vis. Image Underst. 2023 Link

arXiv

Expand arXiv

2026

Title Venue Year Link
A $q$-Polymatroid Framework for Information Leakage in Secure Linear Network Coding arXiv 2026 Link
A Calibrated Memorization Index (MI) for Detecting Training Data Leakage in Generative MRI Models arXiv 2026 Link
A Novel Transfer Learning Approach for Mental Stability Classification from Voice Signal arXiv 2026 Link
A Real-Time Privacy-Preserving Behavior Recognition System via Edge-Cloud Collaboration arXiv 2026 Link
A Secure and Private Distributed Bayesian Federated Learning Design arXiv 2026 Link
A Unified Masked Jigsaw Puzzle Framework for Vision and Language Models arXiv 2026 Link
A joint diffusion approach to multi-modal inference in inertial confinement fusion arXiv 2026 Link
AI Generated Text Detection arXiv 2026 Link
Adaptive Attribute-Decoupled Encryption for Trusted Respiratory Monitoring in Resource-Limited Consumer Healthcare arXiv 2026 Link
Aegis: Towards Governance, Integrity, and Security of AI Voice Agents arXiv 2026 Link
AgentLeak: A Full-Stack Benchmark for Privacy Leakage in Multi-Agent LLM Systems arXiv 2026 Link
Anonymization-Enhanced Privacy Protection for Mobile GUI Agents: Available but Invisible arXiv 2026 Link
Automated Disentangling Analysis of Skin Colour for Lesion Images arXiv 2026 Link
Benchmark Leakage Trap: Can We Trust LLM-based Recommendation? arXiv 2026 Link
Benchmarking Knowledge-Extraction Attack and Defense on Retrieval-Augmented Generation arXiv 2026 Link
Beyond Perfect Scores: Proof-by-Contradiction for Trustworthy Machine Learning arXiv 2026 Link
BioPulse-QA: A Dynamic Biomedical Question-Answering Benchmark for Evaluating Factuality, Robustness, and Bias in Large Language Models arXiv 2026 Link
Breaking Semantic-Aware Watermarks via LLM-Guided Coherence-Preserving Semantic Injection arXiv 2026 Link
Burn-After-Use for Preventing Data Leakage through a Secure Multi-Tenant Architecture in Enterprise LLM arXiv 2026 Link
CSSBench: Evaluating the Safety of Lightweight LLMs against Chinese-Specific Adversarial Patterns arXiv 2026 Link
Can 3D point cloud data improve automated body condition score prediction in dairy cattle? arXiv 2026 Link
CanaryBench: Stress Testing Privacy Leakage in Cluster-Level Conversation Summaries arXiv 2026 Link
Clinical-Prior Guided Multi-Modal Learning with Latent Attention Pooling for Gait-Based Scoliosis Screening arXiv 2026 Link
Concept-Aware Privacy Mechanisms for Defending Embedding Inversion Attacks arXiv 2026 Link
Converse Bounds for Sun-Jafar-type Weak Private Information Retrieval arXiv 2026 Link
Cross-reality Location Privacy Protection in 6G-enabled Vehicular Metaverses: An LLM-enhanced Hybrid Generative Diffusion Model-based Approach arXiv 2026 Link
Cycling Race Time Prediction: A Personalized Machine Learning Approach Using Route Topology and Training Load arXiv 2026 Link
DNATokenizer: A GPU-First Byte-to-Identifier Tokenizer for High-Throughput DNA Language Models arXiv 2026 Link
Data-Free Privacy-Preserving for LLMs via Model Inversion and Selective Unlearning arXiv 2026 Link
Decentralized Identity in Practice: Benchmarking Latency, Cost, and Privacy arXiv 2026 Link
Detecting Cybersecurity Threats by Integrating Explainable AI with SHAP Interpretability and Strategic Data Sampling arXiv 2026 Link
Detecting High-Potential SMEs with Heterogeneous Graph Neural Networks arXiv 2026 Link
Differential Privacy Image Generation with Reconstruction Loss and Noise Injection Using an Error Feedback SGD arXiv 2026 Link
Disentangled Representation Learning via Flow Matching arXiv 2026 Link
ELSA: Efficient LLM-Centric Split Aggregation for Privacy-Aware Hierarchical Federated Learning over Resource-Constrained Edge Networks arXiv 2026 Link
ERIS: Enhancing Privacy and Communication Efficiency in Serverless Federated Learning arXiv 2026 Link
Efficient Privacy-Preserving Retrieval Augmented Generation with Distance-Preserving Encryption arXiv 2026 Link
Enhancing Multi-Image Understanding through Delimiter Token Scaling arXiv 2026 Link
Explanations Leak: Membership Inference with Differential Privacy and Active Learning Defense arXiv 2026 Link
Exploring Approaches for Detecting Memorization of Recommender System Data in Large Language Models arXiv 2026 Link
FCMBench: A Comprehensive Financial Credit Multimodal Benchmark for Real-world Applications arXiv 2026 Link
FeatureBench: Benchmarking Agentic Coding for Complex Feature Development arXiv 2026 Link
FedCARE: Federated Unlearning with Conflict-Aware Projection and Relearning-Resistant Recovery arXiv 2026 Link
Finding Connections: Membership Inference Attacks for the Multi-Table Synthetic Data Setting arXiv 2026 Link
From Data Leak to Secret Misses: The Impact of Data Leakage on Secret Detection Models arXiv 2026 Link
Gradient Networks for Universal Magnetic Modeling of Synchronous Machines arXiv 2026 Link
Guarding the Middle: Protecting Intermediate Representations in Federated Split Learning arXiv 2026 Link
HearSay Benchmark: Do Audio LLMs Leak What They Hear? arXiv 2026 Link
Helper-Assisted Coding for Gaussian Wiretap Channels: Deep Learning Meets PhySec arXiv 2026 Link
How Entanglement Reshapes the Geometry of Quantum Differential Privacy arXiv 2026 Link
How does Graph Structure Modulate Membership-Inference Risk for Graph Neural Networks? arXiv 2026 Link
Hybrid Federated and Split Learning for Privacy Preserving Clinical Prediction and Treatment Optimization arXiv 2026 Link
IM-Animation: An Implicit Motion Representation for Identity-decoupled Character Animation arXiv 2026 Link
IU-GUARD: Privacy-Preserving Spectrum Coordination for Incumbent Users under Dynamic Spectrum Sharing arXiv 2026 Link
Inference Attacks Against Graph Generative Diffusion Models arXiv 2026 Link
Invisible Walls: Privacy-Preserving ISAC Empowered by Reconfigurable Intelligent Surfaces arXiv 2026 Link
It's TIME: Towards the Next Generation of Time Series Forecasting Benchmarks arXiv 2026 Link
Know Thy Enemy: Securing LLMs Against Prompt Injection via Diverse Data Synthesis and Instruction-Level Chain-of-Thought Learning arXiv 2026 Link
Knowledge Vector Weakening: Efficient Training-free Unlearning for Large Vision-Language Models arXiv 2026 Link
Language Model Inversion through End-to-End Differentiation arXiv 2026 Link
Laser interferometry as a robust neuromorphic platform for machine learning arXiv 2026 Link
Learning to Collaborate: An Orchestrated-Decentralized Framework for Peer-to-Peer LLM Federation arXiv 2026 Link
Leveraging Membership Inference Attacks for Privacy Measurement in Federated Learning for Remote Sensing Images arXiv 2026 Link
Local Layer-wise Differential Privacy in Federated Learning arXiv 2026 Link
LocationAgent: A Hierarchical Agent for Image Geolocation via Decoupling Strategy and Evidence from Parametric Knowledge arXiv 2026 Link
Long Context, Less Focus: A Scaling Gap in LLMs Revealed through Privacy and Personalization arXiv 2026 Link
Machine Unlearning in Low-Dimensional Feature Subspace arXiv 2026 Link
Membership Inference Attacks Against Fine-tuned Diffusion Language Models arXiv 2026 Link
Memorization Dynamics in Knowledge Distillation for Language Models arXiv 2026 Link
Mind the GAP: Text Safety Does Not Transfer to Tool-Call Safety in LLM Agents arXiv 2026 Link
Mitigating Gradient Inversion Risks in Language Models via Token Obfuscation arXiv 2026 Link
Multi-Scale Global-Instance Prompt Tuning for Continual Test-time Adaptation in Medical Image Segmentation arXiv 2026 Link
NMRGym: A Comprehensive Benchmark for Nuclear Magnetic Resonance Based Molecular Structure Elucidation arXiv 2026 Link
NiMark: A Non-intrusive Watermarking Framework against Screen-shooting Attacks arXiv 2026 Link
Non-Invasive Anemia Detection: A Multichannel PPG-Based Hemoglobin Estimation with Explainable Artificial Intelligence arXiv 2026 Link
OMNI-LEAK: Orchestrator Multi-Agent Network Induced Data Leakage arXiv 2026 Link
Odd Radio Circles Modeled by Shock-Bubble Interactions arXiv 2026 Link
OmniCode: A Benchmark for Evaluating Software Engineering Agents arXiv 2026 Link
On the Evaluation Protocol of Gesture Recognition for UAV-based Rescue Operation based on Deep Learning: A Subject-Independence Perspective arXiv 2026 Link
On the Information Leakage Envelope of the Gaussian Mechanism arXiv 2026 Link
Optimal Real-Time Fusion of Time-Series Data Under Rényi Differential Privacy arXiv 2026 Link
Orthogonalized Multimodal Contrastive Learning with Asymmetric Masking for Structured Representations arXiv 2026 Link
Parallel Collaborative ADMM Privacy Computing and Adaptive GPU Acceleration for Distributed Edge Networks arXiv 2026 Link
Parameter Privacy-Preserving Data Sharing: A Particle-Belief MDP Formulation arXiv 2026 Link
Path-OED for infinite-dimensional Bayesian linear inverse problems governed by PDEs arXiv 2026 Link
Pervasive Vulnerability Analysis and Defense for QKD-based Quantum Private Query arXiv 2026 Link
Physically Consistent Machine Learning for Melting Temperature Prediction of Refractory High-Entropy Alloys arXiv 2026 Link
Physics-Informed Neural Networks for Viscoacoustic Wave Propagation: Forward Modelling, Inversion and Discretization Sensitivity arXiv 2026 Link
Predicting Mortgage Default with Machine Learning: AutoML, Class Imbalance, and Leakage Control arXiv 2026 Link
PriMod4AI: Lifecycle-Aware Privacy Threat Modeling for AI Systems using LLM arXiv 2026 Link
Prior Aware Memorization: An Efficient Metric for Distinguishing Memorization from Generalization in Large Language Models arXiv 2026 Link
Privacy-Aware Split Inference with Speculative Decoding for Large Language Models over Wide-Area Networks arXiv 2026 Link
Privacy-Concealing Cooperative Perception for BEV Scene Segmentation arXiv 2026 Link
Privacy-Preserving Model Transcription with Differentially Private Synthetic Distillation arXiv 2026 Link
Privacy-Utility Trade-offs Under Multi-Level Point-Wise Leakage Constraints arXiv 2026 Link
Private Links, Public Leaks: Consequences of Frictionless User Experience on the Security and Privacy Posture of SMS-Delivered URLs arXiv 2026 Link
Proactive Coded Caching Scheme for D2D Networks arXiv 2026 Link
Proof of Reasoning for Privacy Enhanced Federated Blockchain Learning at the Edge arXiv 2026 Link
Quantum key distribution without authentication and information leakage arXiv 2026 Link
Radiomics in Medical Imaging: Methods, Applications, and Challenges arXiv 2026 Link
Realistic Face Reconstruction from Facial Embeddings via Diffusion Models arXiv 2026 Link
Reconstructing Training Data from Adapter-based Federated Large Language Models arXiv 2026 Link
Res-MIA: A Training-Free Resolution-Based Membership Inference Attack on Federated Learning Models arXiv 2026 Link
Retrieval Pivot Attacks in Hybrid RAG: Measuring and Mitigating Amplified Leakage from Vector Seeds to Graph Expansion arXiv 2026 Link
Robust Distributed Nonconvex Optimization Enabling Communication Acceleration and Privacy Protection arXiv 2026 Link
Robust Federated Learning via Byzantine Filtering over Encrypted Updates arXiv 2026 Link
Robust Privacy: Inference-Time Privacy through Certified Robustness arXiv 2026 Link
Rolling Element Bearing Fault Detection and Diagnosis with One-Dimensional Convolutional Neural Network arXiv 2026 Link
SAFE: Secure and Accurate Federated Learning for Privacy-Preserving Brain-Computer Interfaces arXiv 2026 Link
SPOILER-GUARD: Gating Latency Effects of Memory Accesses through Randomized Dependency Prediction arXiv 2026 Link
SSI-DM: Singularity Skipping Inversion of Diffusion Models arXiv 2026 Link
SWE-AGI: Benchmarking Specification-Driven Software Construction with MoonBit in the Era of Autonomous Agents arXiv 2026 Link
SafeGPT: Preventing Data Leakage and Unethical Outputs in Enterprise LLM Use arXiv 2026 Link
Secure Communications, Sensing, and Computing Towards Next-Generation Networks arXiv 2026 Link
SecureGate: Learning When to Reveal PII Safely via Token-Gated Dual-Adapters for Federated LLMs arXiv 2026 Link
Self-Guard: Defending Large Reasoning Models via enhanced self-reflection arXiv 2026 Link
Sparse Point-wise Privacy Leakage: Mechanism Design and Fundamental Limits arXiv 2026 Link
SpooFL: Spoofing Federated Learning arXiv 2026 Link
Stop Testing Attacks, Start Diagnosing Defenses: The Four-Checkpoint Framework Reveals Where LLM Safety Breaks arXiv 2026 Link
Stream-Voice-Anon: Enhancing Utility of Real-Time Speaker Anonymization via Neural Audio Codec and Language Models arXiv 2026 Link
Synapse Compendium Aware Federated Knowledge Exchange for Tool Routed LLMs arXiv 2026 Link
TAAM:Inductive Graph-Class Incremental Learning with Task-Aware Adaptive Modulation arXiv 2026 Link
TAPM-Net: Trajectory-Aware Perturbation Modeling for Infrared Small Target Detection arXiv 2026 Link
TIP: Resisting Gradient Inversion via Targeted Interpretable Perturbation in Federated Learning arXiv 2026 Link
TM-RUGPULL: A Temporary Sound, Multimodal Dataset for Early Detection of RUG Pulls Across the Tokenized Ecosystem arXiv 2026 Link
Taipan: A Query-free Transfer-based Multiple Sensitive Attribute Inference Attack Solely from Publicly Released Graphs arXiv 2026 Link
TeachBench: A Syllabus-Grounded Framework for Evaluating Teaching Ability in Large Language Models arXiv 2026 Link
The CoinAlg Bind: Profitability-Fairness Tradeoffs in Collective Investment Algorithms arXiv 2026 Link
Towards Privacy-Preserving Mental Health Support with Large Language Models arXiv 2026 Link
Towards Realistic Remote Sensing Dataset Distillation with Discriminative Prototype-guided Diffusion arXiv 2026 Link
UniForce: A Unified Latent Force Model for Robot Manipulation with Diverse Tactile Sensors arXiv 2026 Link
United We Defend: Collaborative Membership Inference Defenses in Federated Learning arXiv 2026 Link
VLA-JEPA: Enhancing Vision-Language-Action Model with Latent World Model arXiv 2026 Link
VQ-Style: Disentangling Style and Content in Motion with Residual Quantized Representations arXiv 2026 Link
VeriTaS: The First Dynamic Benchmark for Multimodal Automated Fact-Checking arXiv 2026 Link
When Evaluation Becomes a Side Channel: Regime Leakage and Structural Mitigations for Alignment Assessment arXiv 2026 Link
When Is Distributed Nonlinear Aggregation Private? Optimality and Information-Theoretical Bounds arXiv 2026 Link
Zero2Text: Zero-Training Cross-Domain Inversion Attacks on Textual Embeddings arXiv 2026 Link
[Re] Benchmarking LLM Capabilities in Negotiation through Scoreable Games arXiv 2026 Link

2025

Title Venue Year Link
$α$-leakage Interpretation of Rényi Capacity arXiv 2025 Link
(Token-Level) InfoRMIA: Stronger Membership Inference and Memorization Assessment for LLMs arXiv 2025 Link
1-2-3 Check: Enhancing Contextual Privacy in LLM via Multi-Agent Reasoning arXiv 2025 Link
A Causality-aware Paradigm for Evaluating Creativity of Multimodal Large Language Models arXiv 2025 Link
A Contrastive Federated Semi-Supervised Learning Intrusion Detection Framework for Internet of Robotic Things arXiv 2025 Link
A Datagram Extension to DNS over QUIC: Proven Resource Conservation in the Internet of Things arXiv 2025 Link
A False Sense of Privacy: Evaluating Textual Data Sanitization Beyond Surface-level Privacy Leakage arXiv 2025 Link
A Framework to Prevent Biometric Data Leakage in the Immersive Technologies Domain arXiv 2025 Link
A Leakage-Aware Data Layer For Student Analytics: The Capire Framework For Multilevel Trajectory Modeling arXiv 2025 Link
A Metabolic-Imaging Integrated Model for Prognostic Prediction in Colorectal Liver Metastases arXiv 2025 Link
A Model-agnostic Strategy to Mitigate Embedding Degradation in Personalized Federated Recommendation arXiv 2025 Link
A New One-Shot Federated Learning Framework for Medical Imaging Classification with Feature-Guided Rectified Flow and Knowledge Distillation arXiv 2025 Link
A Novel Framework for Significant Wave Height Prediction based on Adaptive Feature Extraction Time-Frequency Network arXiv 2025 Link
A Novel Metric for Detecting Memorization in Generative Models for Brain MRI Synthesis arXiv 2025 Link
A Numerical Gradient Inversion Attack in Variational Quantum Neural-Networks arXiv 2025 Link
A Practical Framework for Evaluating Medical AI Security: Reproducible Assessment of Jailbreaking and Privacy Vulnerabilities Across Clinical Specialties arXiv 2025 Link
A Privacy-Preserving Framework for Advertising Personalization Incorporating Federated Learning and Differential Privacy arXiv 2025 Link
A Privacy-Preserving Recommender for Filling Web Forms Using a Local Large Language Model arXiv 2025 Link
A Sample-Level Evaluation and Generative Framework for Model Inversion Attacks arXiv 2025 Link
A Scenario-Oriented Survey of Federated Recommender Systems: Techniques, Challenges, and Future Directions arXiv 2025 Link
A Selective Homomorphic Encryption Approach for Faster Privacy-Preserving Federated Learning arXiv 2025 Link
A Study of Semi-Fungible Token based Wi-Fi Access Control arXiv 2025 Link
A Study on Privacy-Preserving Scholarship Evaluation Based on Decentralized Identity and Zero-Knowledge Proofs arXiv 2025 Link
A Survey of Attacks on Large Language Models arXiv 2025 Link
A Survey of Generative Categories and Techniques in Multimodal Generative Models arXiv 2025 Link
A Survey on Privacy Risks and Protection in Large Language Models arXiv 2025 Link
A Survey on Responsible LLMs: Inherent Risk, Malicious Use, and Mitigation Strategy arXiv 2025 Link
A Taxonomy of Attacks and Defenses in Split Learning arXiv 2025 Link
A Transformer-Based Approach for Diagnosing Fault Cases in Optical Fiber Amplifiers arXiv 2025 Link
A Weighted Gradient Tracking Privacy-Preserving Method for Distributed Optimization arXiv 2025 Link
A geometric and deep learning reproducible pipeline for monitoring floating anthropogenic debris in urban rivers using in situ cameras arXiv 2025 Link
A systematic review of trial-matching pipelines using large language models arXiv 2025 Link
AADNet: Exploring EEG Spatiotemporal Information for Fast and Accurate Orientation and Timbre Detection of Auditory Attention Based on A Cue-Masked Paradigm arXiv 2025 Link
AI Safety in the Eyes of the Downstream Developer: A First Look at Concerns, Practices, and Challenges arXiv 2025 Link
AI-Driven Radio Propagation Prediction in Automated Warehouses using Variational Autoencoders arXiv 2025 Link
AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models arXiv 2025 Link
ALGEN: Few-shot Inversion Attacks on Textual Embeddings using Alignment and Generation arXiv 2025 Link
ARMOUR US: Android Runtime Zero-permission Sensor Usage Monitoring from User Space arXiv 2025 Link
ATLAS: A High-Difficulty, Multidisciplinary Benchmark for Frontier Scientific Reasoning arXiv 2025 Link
AbBiBench: A Benchmark for Antibody Binding Affinity Maturation and Design arXiv 2025 Link
Accelerating Differentially Private Federated Learning via Adaptive Extrapolation arXiv 2025 Link
Achieving Effective Virtual Reality Interactions via Acoustic Gesture Recognition based on Large Language Models arXiv 2025 Link
Adaptive Backtracking for Privacy Protection in Large Language Models arXiv 2025 Link
Adaptive Sensing Performance Design for Enhancing Secure Communication in Networked ISAC Systems arXiv 2025 Link
Adaptive Token Merging for Efficient Transformer Semantic Communication at the Edge arXiv 2025 Link
Adaptive t Design Dummy-Gate Obfuscation for Cryogenic Scale Enforcement arXiv 2025 Link
Advancing Practical Homomorphic Encryption for Federated Learning: Theoretical Guarantees and Efficiency Optimizations arXiv 2025 Link
Advancing Security with Digital Twins: A Comprehensive Survey arXiv 2025 Link
Adversarial Example Based Fingerprinting for Robust Copyright Protection in Split Learning arXiv 2025 Link
Adversarial Reinforcement Learning for Large Language Model Agent Safety arXiv 2025 Link
AegisLLM: Scaling Agentic Systems for Self-Reflective Defense in LLM Security arXiv 2025 Link
Aerial Secure Collaborative Communications under Eavesdropper Collusion in Low-altitude Economy: A Generative Swarm Intelligent Approach arXiv 2025 Link
AgentDAM: Privacy Leakage Evaluation for Autonomous Web Agents arXiv 2025 Link
An Automated, Scalable Machine Learning Model Inversion Assessment Pipeline arXiv 2025 Link
An Empirical Study on Commit Message Generation using LLMs via In-Context Learning arXiv 2025 Link
An Empirical Study on the Security Vulnerabilities of GPTs arXiv 2025 Link
An Improved Quantum Anonymous Notification Protocol for Quantum-Augmented Networks arXiv 2025 Link
An Information Geometric Approach to Local Information Privacy with Applications to Max-lift and Local Differential Privacy arXiv 2025 Link
An Invariant Latent Space Perspective on Language Model Inversion arXiv 2025 Link
An Out-Of-Distribution Membership Inference Attack Approach for Cross-Domain Graph Attacks arXiv 2025 Link
Analog Secure Distributed Matrix Multiplication arXiv 2025 Link
Analysing Safety Risks in LLMs Fine-Tuned with Pseudo-Malicious Cyber Security Data arXiv 2025 Link
Approaching the Harm of Gradient Attacks While Only Flipping Labels arXiv 2025 Link
Approximate Domain Unlearning for Vision-Language Models arXiv 2025 Link
Approximation theory for 1-Lipschitz ResNets arXiv 2025 Link
Architectural Backdoors for Within-Batch Data Stealing and Model Inference Manipulation arXiv 2025 Link
Are Neuro-Inspired Multi-Modal Vision-Language Models Resilient to Membership Inference Privacy Leakage? arXiv 2025 Link
ArenaBencher: Automatic Benchmark Evolution via Multi-Model Competitive Evaluation arXiv 2025 Link
Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships arXiv 2025 Link
Artificial Intelligence-Driven Clinical Decision Support Systems arXiv 2025 Link
Artificial intelligence as a surrogate brain: Bridging neural dynamical models and data arXiv 2025 Link
Ascending the Infinite Ladder: Benchmarking Spatial Deformation Reasoning in Vision-Language Models arXiv 2025 Link
Ask ChatGPT: Caveats and Mitigations for Individual Users of AI Chatbots arXiv 2025 Link
Assessing Coherency and Consistency of Code Execution Reasoning by Large Language Models arXiv 2025 Link
Assessing User Privacy Leakage in Synthetic Packet Traces: An Attack-Grounded Approach arXiv 2025 Link
Assessing and Mitigating Data Memorization Risks in Fine-Tuned Large Language Models arXiv 2025 Link
Attractive Metadata Attack: Inducing LLM Agents to Invoke Malicious Tools arXiv 2025 Link
Auditing Data Provenance in Real-world Text-to-Image Diffusion Models for Privacy and Copyright Protection arXiv 2025 Link
Auditing Prompt Caching in Language Model APIs arXiv 2025 Link
AugMixCloak: A Defense against Membership Inference Attacks via Image Transformation arXiv 2025 Link
Automated Privacy Information Annotation in Large Language Model Interactions arXiv 2025 Link
Automated Profile Inference with Language Model Agents arXiv 2025 Link
BYO-Eval: Build Your Own Dataset for Fine-Grained Visual Assessment of Multimodal Language Models arXiv 2025 Link
Backing the Wrong Horse: How Bit-Level Netlist Augmentation can Counter Power Side Channel Attacks arXiv 2025 Link
Balancing Privacy and Action Performance: A Penalty-Driven Approach to Image Anonymization arXiv 2025 Link
Balancing Privacy and Utility in Correlated Data: A Study of Bayesian Differential Privacy arXiv 2025 Link
Balancing Utility and Privacy: Dynamically Private SGD with Random Projection arXiv 2025 Link
Bayesian Inference and Learning in Nonlinear Dynamical Systems: A Framework for Incorporating Explicit and Implicit Prior Knowledge arXiv 2025 Link
BeamClean: Language Aware Embedding Reconstruction arXiv 2025 Link
Beamforming Design for Secure RIS-Enabled ISAC: Passive RIS vs. Active RIS arXiv 2025 Link
BenLOC: A Benchmark for Learning to Configure MIP Optimizers arXiv 2025 Link
Better Language Model Inversion by Compactly Representing Next-Token Distributions arXiv 2025 Link
Beyond Data Privacy: New Privacy Risks for Large Language Models arXiv 2025 Link
Beyond Diagnostic Performance: Revealing and Quantifying Ethical Risks in Pathology Foundation Models arXiv 2025 Link
Beyond Isolated Investor: Predicting Startup Success via Roleplay-Based Collective Agents arXiv 2025 Link
Beyond Jailbreaking: Auditing Contextual Privacy in LLM Agents arXiv 2025 Link
Beyond Leakage and Complexity: Towards Realistic and Efficient Information Cascade Prediction arXiv 2025 Link
Beyond PII: How Users Attempt to Estimate and Mitigate Implicit LLM Inference arXiv 2025 Link
Beyond Pixels: Semantic-aware Typographic Attack for Geo-Privacy Protection arXiv 2025 Link
Beyond Simple Concatenation: Fairly Assessing PLM Architectures for Multi-Chain Protein-Protein Interactions Prediction arXiv 2025 Link
Beyond Verification: Abductive Explanations for Post-AI Assessment of Privacy Leakage arXiv 2025 Link
Beyond the Worst Case: Extending Differential Privacy Guarantees to Realistic Adversaries arXiv 2025 Link
Bits for Privacy: Evaluating Post-Training Quantization via Membership Inference arXiv 2025 Link
Black-Box Auditing of Quantum Model: Lifted Differential Privacy with Quantum Canaries arXiv 2025 Link
Breaking BERT: Gradient Attack on Twitter Sentiment Analysis for Targeted Misclassification arXiv 2025 Link
BudgetLeak: Membership Inference Attacks on RAG Systems via the Generation Budget Side Channel arXiv 2025 Link
Building Age Estimation: A New Multi-Modal Benchmark Dataset and Community Challenge arXiv 2025 Link
ByzSFL: Achieving Byzantine-Robust Secure Federated Learning with Zero-Knowledge Proofs arXiv 2025 Link
Byzantine Outside, Curious Inside: Reconstructing Data Through Malicious Updates arXiv 2025 Link
CAT: A GPU-Accelerated FHE Framework with Its Application to High-Precision Private Dataset Query arXiv 2025 Link
CRFU: Compressive Representation Forgetting Against Privacy Leakage on Machine Unlearning arXiv 2025 Link
CTIGuardian: A Few-Shot Framework for Mitigating Privacy Leakage in Fine-Tuned LLMs arXiv 2025 Link
CV Quantum Communications with Angular Rejection Filtering: Modeling and Security Analysis arXiv 2025 Link
Can Federated Learning Safeguard Private Data in LLM Training? Vulnerabilities, Attacks, and Defense Evaluation arXiv 2025 Link
Can LLMs reason over extended multilingual contexts? Towards long-context evaluation beyond retrieval and haystacks arXiv 2025 Link
Can Large Language Models Really Recognize Your Name? arXiv 2025 Link
CapRecover: A Cross-Modality Feature Inversion Attack Framework on Vision Language Models arXiv 2025 Link
Channel Selected Stratified Nested Cross Validation for Clinically Relevant EEG Based Parkinsons Disease Detection arXiv 2025 Link
Characterizing Many-body Dynamics with Projected Ensembles on a Superconducting Quantum Processor arXiv 2025 Link
Characterizing Trust Boundary Vulnerabilities in TEE Containers arXiv 2025 Link
ChronoSteer: Bridging Large Language Model and Time Series Foundation Model via Synthetic Data arXiv 2025 Link
Clinical-Grade Blood Pressure Prediction in ICU Settings: An Ensemble Framework with Uncertainty Quantification and Cross-Institutional Validation arXiv 2025 Link
Cluster-guided LLM-Based Anonymization of Software Analytics Data: Studying Privacy-Utility Trade-offs in JIT Defect Prediction arXiv 2025 Link
CoSPED: Consistent Soft Prompt Targeted Data Extraction and Defense arXiv 2025 Link
CodeMorph: Mitigating Data Leakage in Large Language Model Assessment arXiv 2025 Link
Collaborative LLM Numerical Reasoning with Local Data Protection arXiv 2025 Link
Collaborative penetration testing suite for emerging generative AI algorithms arXiv 2025 Link
ColorVein: Colorful Cancelable Vein Biometrics arXiv 2025 Link
Comment on "mbtransfer: Microbiome intervention analysis using transfer functions and mirror statistics": Implementation errors, theoretical misapplication, and methodological flaws arXiv 2025 Link
CompLeak: Deep Learning Model Compression Exacerbates Privacy Leakage arXiv 2025 Link
Comparison of Lightweight Methods for Vehicle Dynamics-Based Driver Drowsiness Detection arXiv 2025 Link
Computation-Efficient and Recognition-Friendly 3D Point Cloud Privacy Protection arXiv 2025 Link
ConcreTizer: Model Inversion Attack via Occupancy Classification and Dispersion Control for 3D Point Cloud Restoration arXiv 2025 Link
Confidentiality in a Card-Based Protocol Under Repeated Biased Shuffles arXiv 2025 Link
ContextLeak: Auditing Leakage in Private In-Context Learning Methods arXiv 2025 Link
Contextual Integrity in LLMs via Reasoning and Reinforcement Learning arXiv 2025 Link
Controlled privacy leakage propagation throughout overlapping grouped learning arXiv 2025 Link
Coverage-Guided Pre-Silicon Fuzzing of Open-Source Processors based on Leakage Contracts arXiv 2025 Link
Cross-Modal Unlearning via Influential Neuron Path Editing in Multimodal Large Language Models arXiv 2025 Link
Cryptanalysis via Machine Learning Based Information Theoretic Metrics arXiv 2025 Link
Cueless EEG imagined speech for subject identification: dataset and benchmarks arXiv 2025 Link
DBINDS -- Can Initial Noise from Diffusion Model Inversion Help Reveal AI-Generated Videos? arXiv 2025 Link
DCMI: A Differential Calibration Membership Inference Attack Against Retrieval-Augmented Generation arXiv 2025 Link
DELTA: Variational Disentangled Learning for Privacy-Preserving Data Reprogramming arXiv 2025 Link
DIA: The Adversarial Exposure of Deterministic Inversion in Diffusion Models arXiv 2025 Link
DOS: Distilling Observable Softmaps of Zipfian Prototypes for Self-Supervised Point Representation arXiv 2025 Link
DP-AdamW: Investigating Decoupled Weight Decay and Bias Correction in Private Deep Learning arXiv 2025 Link
DP-GPL: Differentially Private Graph Prompt Learning arXiv 2025 Link
DPF-CM: A Data Processing Framework with Privacy-Preserving Vector Databases for Chinese Medical LLMs Training and Deployment arXiv 2025 Link
DRAGOn: Designing RAG On Periodically Updated Corpus arXiv 2025 Link
DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agents arXiv 2025 Link
DRIK: Distribution-Robust Inductive Kriging without Information Leakage arXiv 2025 Link
DRIVE: Data Curation Best Practices for Reinforcement Learning with Verifiable Reward in Competitive Code Generation arXiv 2025 Link
DSBC : Data Science task Benchmarking with Context engineering arXiv 2025 Link
DSFL: A Dual-Server Byzantine-Resilient Federated Learning Framework via Group-Based Secure Aggregation arXiv 2025 Link
Data Leakage and Deceptive Performance: A Critical Examination of Credit Card Fraud Detection Methodologies arXiv 2025 Link
Data Leakage and Redundancy in the LIT-PCBA Benchmark arXiv 2025 Link
Data Leakage in Visual Datasets arXiv 2025 Link
Data Privatization in Vertical Federated Learning with Client-wise Missing Problem arXiv 2025 Link
Data-Free Black-Box Federated Learning via Zeroth-Order Gradient Estimation arXiv 2025 Link
Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI arXiv 2025 Link
Deciphering the Interplay between Attack and Protection Complexity in Privacy-Preserving Federated Learning arXiv 2025 Link
Decompile-Bench: Million-Scale Binary-Source Function Pairs for Real-World Binary Decompilation arXiv 2025 Link
Deep Learning Model Inversion Attacks and Defenses: A Comprehensive Survey arXiv 2025 Link
Deep Multi-modal Breast Cancer Detection Network arXiv 2025 Link
DeepResearch Arena: The First Exam of LLMs' Research Abilities via Seminar-Grounded Tasks arXiv 2025 Link
Defeating Cerberus: Concept-Guided Privacy-Leakage Mitigation in Multimodal Language Models arXiv 2025 Link
Defending Against Gradient Inversion Attacks for Biomedical Images via Learnable Data Perturbation arXiv 2025 Link
Depth Gives a False Sense of Privacy: LLM Internal States Inversion arXiv 2025 Link
Design and Analysis of a Concatenated Code for Intersymbol Interference Wiretap Channels arXiv 2025 Link
Determining the origin of the X-ray emission in blazars through multiwavelength polarization arXiv 2025 Link
DiViD: Disentangled Video Diffusion for Static-Dynamic Factorization arXiv 2025 Link
DiagnosisArena: Benchmarking Diagnostic Reasoning for Large Language Models arXiv 2025 Link
DictPFL: Efficient and Private Federated Learning on Encrypted Gradients arXiv 2025 Link
DiffMI: Breaking Face Recognition Privacy via Diffusion-Driven Training-Free Model Inversion arXiv 2025 Link
Differential Privacy Analysis of Decentralized Gossip Averaging under Varying Threat Models arXiv 2025 Link
Differential Privacy Personalized Federated Learning Based on Dynamically Sparsified Client Updates arXiv 2025 Link
Differential Privacy for Network Assortativity arXiv 2025 Link
Differential Privacy in Federated Learning: Mitigating Inference Attacks with Randomized Response arXiv 2025 Link
Differential Privacy: Gradient Leakage Attacks in Federated Learning Environments arXiv 2025 Link
Differentially Private Computation of the Gini Index for Income Inequality arXiv 2025 Link
Differentially Private Conformal Prediction via Quantile Binary Search arXiv 2025 Link
Differentially Private Federated Clustering with Random Rebalancing arXiv 2025 Link
Differentially Private Federated Low Rank Adaptation Beyond Fixed-Matrix arXiv 2025 Link
Differentially Private Fisher Randomization Tests for Binary Outcomes arXiv 2025 Link
Differentially Private Gradient-Tracking-Based Distributed Stochastic Optimization over Directed Graphs arXiv 2025 Link
Differentially Private In-context Learning via Sampling Few-shot Mixed with Zero-shot Outputs arXiv 2025 Link
Differentially Private Online Distributed Aggregative Games With Time-Varying and Non-Identical Communication and Feedback Delays arXiv 2025 Link
Differentially Private Secure Multiplication with Erasures and Adversaries arXiv 2025 Link
Differentially Private Two-Stage Gradient Descent for Instrumental Variable Regression arXiv 2025 Link
Diffusion-aided Task-oriented Semantic Communications with Model Inversion Attack arXiv 2025 Link
Diffusion-based Dynamic Contract for Federated AI Agent Construction in Mobile Metaverses arXiv 2025 Link
Disparate Privacy Vulnerability: Targeted Attribute Inference Attacks and Defenses arXiv 2025 Link
Distilling Expert Surgical Knowledge: How to train local surgical VLMs for anatomy explanation in Complete Mesocolic Excision arXiv 2025 Link
Distributed Batch Matrix Multiplication: Trade-Offs in Download Rate, Randomness, and Privacy arXiv 2025 Link
Distributed Fusion Estimation with Protecting Exogenous Inputs arXiv 2025 Link
Distributed Platoon Control Under Quantization: Stability Analysis and Privacy Preservation arXiv 2025 Link
Do Fairness Interventions Come at the Cost of Privacy: Evaluations for Binary Classifiers arXiv 2025 Link
Do Reasoning Vision-Language Models Inversely Scale in Test-Time Compute? A Distractor-centric Empirical Analysis arXiv 2025 Link
Do Spikes Protect Privacy? Investigating Black-Box Model Inversion Attacks in Spiking Neural Networks arXiv 2025 Link
Do Vision-Language Models Leak What They Learn? Adaptive Token-Weighted Model Inversion Attacks arXiv 2025 Link
Does Understanding Inform Generation in Unified Multimodal Models? From Analysis to Path Forward arXiv 2025 Link
Domain-aware priors enable vertical federated learning in data-scarce coral multi-omics arXiv 2025 Link
Doxing via the Lens: Revealing Location-related Privacy Leakage on Multi-modal Large Reasoning Models arXiv 2025 Link
DreamVLA: A Vision-Language-Action Model Dreamed with Comprehensive World Knowledge arXiv 2025 Link
Dropout-Robust Mechanisms for Differentially Private and Fully Decentralized Mean Estimation arXiv 2025 Link
Dual-Phase Federated Deep Unlearning via Weight-Aware Rollback and Reconstruction arXiv 2025 Link
Dual-View Inference Attack: Machine Unlearning Amplifies Privacy Exposure arXiv 2025 Link
DualTAP: A Dual-Task Adversarial Protector for Mobile MLLM Agents arXiv 2025 Link
DyLoC: A Dual-Layer Architecture for Secure and Trainable Quantum Machine Learning Under Polynomial-DLA constraint arXiv 2025 Link
EASY: Emotion-aware Speaker Anonymization via Factorized Distillation arXiv 2025 Link
EEG-to-fMRI synthesis of task-evoked and spontaneous brain activity: addressing issues of statistical significance and generalizability arXiv 2025 Link
EdgePrompt: A Distributed Key-Value Inference Framework for LLMs in 6G Networks arXiv 2025 Link
Effective and Efficient Cross-City Traffic Knowledge Transfer: A Privacy-Preserving Perspective arXiv 2025 Link
Efficient Byzantine-Robust Privacy-Preserving Federated Learning via Dimension Compression arXiv 2025 Link
Efficient Full-Stack Private Federated Deep Learning with Post-Quantum Security arXiv 2025 Link
Efficient Multi-Worker Selection based Distributed Swarm Learning via Analog Aggregation arXiv 2025 Link
Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds arXiv 2025 Link
Electromagnetic Side-Channel Analysis of PRESENT Lightweight Cipher arXiv 2025 Link
Emergent LLM behaviors are observationally equivalent to data leakage arXiv 2025 Link
Empirical Comparison of Membership Inference Attacks in Deep Transfer Learning arXiv 2025 Link
Enhanced Privacy Leakage from Noise-Perturbed Gradients via Gradient-Guided Conditional Diffusion Models arXiv 2025 Link
Enhancing Federated Learning Privacy with QUBO arXiv 2025 Link
EnronQA: Towards Personalized RAG over Private Documents arXiv 2025 Link
Ensembling Membership Inference Attacks Against Tabular Generative Models arXiv 2025 Link
Enter, Exit, Page Fault, Leak: Testing Isolation Boundaries for Microarchitectural Leaks arXiv 2025 Link
Entropic learning enables skilful forecasts of ENSO phase at up to two years lead time arXiv 2025 Link
Environment-Aware Indoor LoRaWAN Ranging Using Path Loss Model Inversion and Adaptive RSSI Filtering arXiv 2025 Link
Evaluating Differential Privacy on Correlated Datasets Using Pointwise Maximal Leakage arXiv 2025 Link
Evaluating Large Language Models on the 2026 Korean CSAT Mathematics Exam: Measuring Mathematical Ability in a Zero-Data-Leakage Setting arXiv 2025 Link
Evaluating Privacy-Utility Tradeoffs in Synthetic Smart Grid Data arXiv 2025 Link
Evaluating Selective Encryption Against Gradient Inversion Attacks arXiv 2025 Link
Evaluating and Improving Large Language Models for Competitive Program Generation arXiv 2025 Link
Evaluating the Dynamics of Membership Privacy in Deep Learning arXiv 2025 Link
Evaluating the Process Modeling Abilities of Large Language Models -- Preliminary Foundations and Results arXiv 2025 Link
Evaluating the Sensitivity of BiLSTM Forecasting Models to Sequence Length and Input Noise arXiv 2025 Link
Event-based Video Person Re-identification via Cross-Modality and Temporal Collaboration arXiv 2025 Link
Everyone's Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors arXiv 2025 Link
Evolution without Large Models: Training Language Model with Task Principles arXiv 2025 Link
Experimental Quantum Electronic Voting arXiv 2025 Link
Explore the vulnerability of black-box models via diffusion models arXiv 2025 Link
Exploring Graph Learning Tasks with Pure LLMs: A Comprehensive Benchmark and Investigation arXiv 2025 Link
Exploring Potential Prompt Injection Attacks in Federated Military LLMs and Their Mitigation arXiv 2025 Link
Exploring Selective Retrieval-Augmentation for Long-Tail Legal Text Classification arXiv 2025 Link
Exploring the Potential and Limitations of Large Language Models for Novice Program Fault Localization arXiv 2025 Link
Exploring the Vulnerabilities of Federated Learning: A Deep Dive into Gradient Inversion Attacks arXiv 2025 Link
FADE: Frequency-Aware Diffusion Model Factorization for Video Editing arXiv 2025 Link
FaceCloak: Learning to Protect Face Templates arXiv 2025 Link
Factor Decorrelation Enhanced Data Removal from Deep Predictive Models arXiv 2025 Link
Feasibility of short blocklength Reed-Muller codes for physical layer security in real environment arXiv 2025 Link
FeatBench: Towards More Realistic Evaluation of Feature-level Code Generation arXiv 2025 Link
Feature-Selective Representation Misdirection for Machine Unlearning arXiv 2025 Link
FedAU2: Attribute Unlearning for User-Level Federated Recommender Systems with Adaptive and Robust Adversarial Training arXiv 2025 Link
FedBKD: Distilled Federated Learning to Embrace Gerneralization and Personalization on Non-IID Data arXiv 2025 Link
FedBM: Stealing Knowledge from Pre-trained Language Models for Heterogeneous Federated Learning arXiv 2025 Link
FedGRec: Dynamic Spatio-Temporal Federated Graph Learning for Secure and Efficient Cross-Border Recommendations arXiv 2025 Link
FedMPDD: Communication-Efficient Federated Learning with Privacy Preservation Attributes via Projected Directional Derivative arXiv 2025 Link
FedMeNF: Privacy-Preserving Federated Meta-Learning for Neural Fields arXiv 2025 Link
FedOnco-Bench: A Reproducible Benchmark for Privacy-Aware Federated Tumor Segmentation with Synthetic CT Data arXiv 2025 Link
FedRE: A Representation Entanglement Framework for Model-Heterogeneous Federated Learning arXiv 2025 Link
FedRE: Robust and Effective Federated Learning with Privacy Preference arXiv 2025 Link
FedSDA: Federated Stain Distribution Alignment for Non-IID Histopathological Image Classification arXiv 2025 Link
FedShield-LLM: A Secure and Scalable Federated Fine-Tuned Large Language Model arXiv 2025 Link
Federated Anomaly Detection for Multi-Tenant Cloud Platforms with Personalized Modeling arXiv 2025 Link
Federated Conversational Recommender System arXiv 2025 Link
Federated Deep Reinforcement Learning for Privacy-Preserving Robotic-Assisted Surgery arXiv 2025 Link
Federated Latent Factor Model for Bias-Aware Recommendation with Privacy-Preserving arXiv 2025 Link
Federated Learning with Differential Privacy: An Utility-Enhanced Approach arXiv 2025 Link
Feedback Lunch: Deep Feedback Codes for Wiretap Channels arXiv 2025 Link
Few-Shot Fingerprinting Subject Re-Identification in 3D-MRI and 2D-X-Ray arXiv 2025 Link
Find the Leak, Fix the Split: Cluster-Based Method to Prevent Leakage in Video-Derived Datasets arXiv 2025 Link
Fine-Grained Privacy Extraction from Retrieval-Augmented Generation Systems via Knowledge Asymmetry Exploitation arXiv 2025 Link
Fixed-Budget Parameter-Efficient Training with Frozen Encoders Improves Multimodal Chest X-Ray Classification arXiv 2025 Link
FollowUpBot: An LLM-Based Conversational Robot for Automatic Postoperative Follow-up arXiv 2025 Link
ForamDeepSlice: A High-Accuracy Deep Learning Framework for Foraminifera Species Classification from 2D Micro-CT Slices arXiv 2025 Link
Formalisation of Security for Federated Learning with DP and Attacker Advantage in IIIf for Satellite Swarms -- Extended Version arXiv 2025 Link
From Assistants to Adversaries: Exploring the Security Risks of Mobile LLM Agents arXiv 2025 Link
From Easy to Hard: Building a Shortcut for Differentially Private Image Synthesis arXiv 2025 Link
From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning arXiv 2025 Link
From Membership-Privacy Leakage to Quantum Machine Unlearning arXiv 2025 Link
From Prediction to Perfection: Introducing Refinement to Autoregressive Image Generation arXiv 2025 Link
FuSeFL: Fully Secure and Scalable Federated Learning arXiv 2025 Link
Functional Encryption in Secure Neural Network Training: Data Leakage and Practical Mitigations arXiv 2025 Link
GAITEX: Human motion dataset of impaired gait and rehabilitation exercises using inertial and optical sensors arXiv 2025 Link
GAMA: A General Anonymizing Multi-Agent System for Privacy Preservation Enhanced by Domain Rules and Disproof Mechanism arXiv 2025 Link
GCC-Spam: Spam Detection via GAN, Contrastive Learning, and Character Similarity Networks arXiv 2025 Link
GPT, But Backwards: Exactly Inverting Language Model Outputs arXiv 2025 Link
GRAIN: Exact Graph Reconstruction from Gradients arXiv 2025 Link
GRPO Privacy Is at Risk: A Membership Inference Attack Against Reinforcement Learning With Verifiable Rewards arXiv 2025 Link
GUIDE: Enhancing Gradient Inversion Attacks in Federated Learning with Denoising Models arXiv 2025 Link
Gaussian Shading++: Rethinking the Realistic Deployment Challenge of Performance-Lossless Image Watermark for Diffusion Models arXiv 2025 Link
Generating Synthetic Data with Formal Privacy Guarantees: State of the Art and the Road Ahead arXiv 2025 Link
Generative Induction of Dialogue Task Schemas with Streaming Refinement and Simulated Interactions arXiv 2025 Link
Generative Model Inversion Through the Lens of the Manifold Hypothesis arXiv 2025 Link
GeoArena: An Open Platform for Benchmarking Large Vision-language Models on WorldWide Image Geolocalization arXiv 2025 Link
GhostEI-Bench: Do Mobile Agents Resilience to Environmental Injection in Dynamic On-Device Environments? arXiv 2025 Link
Golden Partition Zone: Rethinking Neural Network Partitioning Under Inversion Threats in Collaborative Inference arXiv 2025 Link
Gradient Inversion Attacks on Parameter-Efficient Fine-Tuning arXiv 2025 Link
Gradient Inversion Transcript: Leveraging Robust Generative Priors to Reconstruct Training Data from Gradient Leakage arXiv 2025 Link
Gradient Inversion in Federated Reinforcement Learning arXiv 2025 Link
Graph Unlearning: Efficient Node Removal in Graph Neural Networks arXiv 2025 Link
Graph-Level Label-Only Membership Inference Attack against Graph Neural Networks arXiv 2025 Link
GraphQLer: Enhancing GraphQL Security with Context-Aware API Testing arXiv 2025 Link
HALT-RAG: A Task-Adaptable Framework for Hallucination Detection with Calibrated NLI Ensembles and Abstention arXiv 2025 Link
HalluLens: LLM Hallucination Benchmark arXiv 2025 Link
HiDe-LLaVA: Hierarchical Decoupling for Continual Instruction Tuning of Multimodal Large Language Model arXiv 2025 Link
Hidden Leaks in Time Series Forecasting: How Data Leakage Affects LSTM Evaluation Across Configurations and Validation Strategies arXiv 2025 Link
Hierarchical Multi-Modal Threat Intelligence Fusion Without Aligned Data: A Practical Framework for Real-World Security Operations arXiv 2025 Link
Honey Trap or Romantic Utopia: A Case Study of Final Fantasy XIV Players PII Disclosure in Intimate Partner-Seeking Posts arXiv 2025 Link
How AI Forecasts AI Jobs: Benchmarking LLM Predictions of Labor Market Changes arXiv 2025 Link
How Breakable Is Privacy: Probing and Resisting Model Inversion Attacks in Collaborative Inference arXiv 2025 Link
How Far are App Secrets from Being Stolen? A Case Study on Android arXiv 2025 Link
How Feasible is Augmenting Fake Nodes with Learnable Features as a Counter-strategy against Link Stealing Attacks? arXiv 2025 Link
How Secure is Forgetting? Linking Machine Unlearning to Machine Learning Attacks arXiv 2025 Link
How Would Oblivious Memory Boost Graph Analytics on Trusted Processors? arXiv 2025 Link
How to DP-fy Your Data: A Practical Guide to Generating Synthetic Data With Differential Privacy arXiv 2025 Link
Hybrid Physics-ML Framework for Pan-Arctic Permafrost Infrastructure Risk at Record 2.9-Million Observation Scale arXiv 2025 Link
Hyperparameters in Score-Based Membership Inference Attacks arXiv 2025 Link
I Can Tell Your Secrets: Inferring Privacy Attributes from Mini-app Interaction History in Super-apps arXiv 2025 Link
I Know What You Bought Last Summer: Investigating User Data Leakage in E-Commerce Platforms arXiv 2025 Link
IMU: Influence-guided Machine Unlearning arXiv 2025 Link
IQBench: How "Smart'' Are Vision-Language Models? A Study with Human IQ Tests arXiv 2025 Link
ISACL: Internal State Analyzer for Copyrighted Training Data Leakage arXiv 2025 Link
Image Inversion: A Survey from GANs to Diffusion and Beyond arXiv 2025 Link
Image Super-Resolution with Guarantees via Conformalized Generative Models arXiv 2025 Link
Image selective encryption analysis using mutual information in CNN based embedding space arXiv 2025 Link
Images in Motion?: A First Look into Video Leakage in Collaborative Deep Learning arXiv 2025 Link
Impacts of Data Splitting Strategies on Parameterized Link Prediction Algorithms arXiv 2025 Link
Imperfect preparation and Trojan attack on the phase modulator in the decoy-state BB84 protocol arXiv 2025 Link
ImprovDML: Improved Trade-off in Private Byzantine-Resilient Distributed Machine Learning arXiv 2025 Link
Improving ARDS Diagnosis Through Context-Aware Concept Bottleneck Models arXiv 2025 Link
Improving Google A2A Protocol: Protecting Sensitive Data and Mitigating Unintended Harms in Multi-Agent Systems arXiv 2025 Link
Improving LLM-Powered EDA Assistants with RAFT arXiv 2025 Link
Improving Underwater Acoustic Classification Through Learnable Gabor Filter Convolution and Attention Mechanisms arXiv 2025 Link
Improving key rates by tighter information reconciliation leakage estimation for quantum key distribution arXiv 2025 Link
Individual Confidential Computing of Polynomials over Non-Uniform Information arXiv 2025 Link
InfoDecom: Decomposing Information for Defending Against Privacy Leakage in Split Inference arXiv 2025 Link
Information Leakage in Data Linkage arXiv 2025 Link
Information Leakage of Sentence Embeddings via Generative Embedding Inversion Attacks arXiv 2025 Link
Information Leakages in the Green Bond Market arXiv 2025 Link
Information Theoretic One-Time Programs from Geometrically Local $\text{QNC}_0$ Adversaries arXiv 2025 Link
Information-Theoretic Fairness with A Bounded Statistical Parity Constraint arXiv 2025 Link
Integrated Security Mechanisms for Weight Protection in Memristive Crossbar Arrays arXiv 2025 Link
Intelligent Joint Security and Delay Determinacy Performance Guarantee Strategy in RIS-Assisted IIoT Communication Systems arXiv 2025 Link
IntentMiner: Intent Inversion Attack via Tool Call Analysis in the Model Context Protocol arXiv 2025 Link
Interaction-Aware Parameter Privacy-Preserving Data Sharing in Coupled Systems via Particle Filter Reinforcement Learning arXiv 2025 Link
Introducing Resilience to IRS-Assisted Secure Wireless Systems arXiv 2025 Link
InverTune: Removing Backdoors from Multimodal Contrastive Learning Models via Trigger Inversion and Activation Tuning arXiv 2025 Link
Inverse Reinforcement Learning using Revealed Preferences and Passive Stochastic Optimization arXiv 2025 Link
Inversion-DPO: Precise and Efficient Post-Training for Diffusion Models arXiv 2025 Link
Inverting Black-Box Face Recognition Systems via Zero-Order Optimization in Eigenface Space arXiv 2025 Link
Investigating Timing-Based Information Leakage in Data Flow-Driven Real-Time Systems arXiv 2025 Link
Invisible Prompts, Visible Threats: Malicious Font Injection in External Resources for Large Language Models arXiv 2025 Link
IoTFuzzSentry: A Protocol Guided Mutation Based Fuzzer for Automatic Vulnerability Testing in Commercial IoT Devices arXiv 2025 Link
Is Your LLM Really Mastering the Concept? A Multi-Agent Benchmark arXiv 2025 Link
Islands in Kerr-Newman Black Holes arXiv 2025 Link
KHRONOS: a Kernel-Based Neural Architecture for Rapid, Resource-Efficient Scientific Computation arXiv 2025 Link
KV-Auditor: Auditing Local Differential Privacy for Correlated Key-Value Estimation arXiv 2025 Link
Keystroke Detection by Exploiting Unintended RF Emission from Repaired USB Keyboards arXiv 2025 Link
Knowledge Distillation for Variational Quantum Convolutional Neural Networks on Heterogeneous Data arXiv 2025 Link
Knowledge-Guided Machine Learning Models to Upscale Evapotranspiration in the U.S. Midwest arXiv 2025 Link
LADSG: Label-Anonymized Distillation and Similar Gradient Substitution for Label Privacy in Vertical Federated Learning arXiv 2025 Link
LAGO: Few-shot Crosslingual Embedding Inversion Attacks via Language Similarity-Aware Graph Optimization arXiv 2025 Link
LANPO: Bootstrapping Language and Numerical Feedback for Reinforcement Learning in LLMs arXiv 2025 Link
LAPA-based Dynamic Privacy Optimization for Wireless Federated Learning in Heterogeneous Environments arXiv 2025 Link
LITcoder: A General-Purpose Library for Building and Comparing Encoding Models arXiv 2025 Link
LLA: Enhancing Security and Privacy for Generative Models with Logic-Locked Accelerators arXiv 2025 Link
LLM Agents Should Employ Security Principles arXiv 2025 Link
LLMs on support of privacy and security of mobile apps: state of the art and research directions arXiv 2025 Link
LOCO-EPI: Leave-one-chromosome-out (LOCO) as a benchmarking paradigm for deep learning based prediction of enhancer-promoter interactions arXiv 2025 Link
LSHFed: Robust and Communication-Efficient Federated Learning with Locally-Sensitive Hashing Gradient Mapping arXiv 2025 Link
Large Language Models for Validating Network Protocol Parsers arXiv 2025 Link
Large-Scale FPGA-Based Privacy Amplification Exceeding $10^8$ Bits for Quantum Key Distribution arXiv 2025 Link
LastingBench: Defend Benchmarks Against Knowledge Leakage arXiv 2025 Link
Latent Diffusion Inversion Requires Understanding the Latent Space arXiv 2025 Link
Latent Diffusion Unlearning: Protecting Against Unauthorized Personalization Through Trajectory Shifted Perturbations arXiv 2025 Link
Latent Twins arXiv 2025 Link
LeakSealer: A Semisupervised Defense for LLMs Against Prompt Injection and Leakage Attacks arXiv 2025 Link
Leakage and Interpretability in Concept-Based Models arXiv 2025 Link
Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset arXiv 2025 Link
LeakageDetector 2.0: Analyzing Data Leakage in Jupyter-Driven Machine Learning Pipelines arXiv 2025 Link
LeakageDetector: An Open Source Data Leakage Analysis Tool in Machine Learning Pipelines arXiv 2025 Link
Leaky Thoughts: Large Reasoning Models Are Not Private Thinkers arXiv 2025 Link
LeakyCLIP: Extracting Training Data from CLIP arXiv 2025 Link
Learning Private Representations through Entropy-based Adversarial Training arXiv 2025 Link
Learning to Diagnose Privately: DP-Powered LLMs for Radiology Report Classification arXiv 2025 Link
Learning to Erase Private Knowledge from Multi-Documents for Retrieval-Augmented Large Language Models arXiv 2025 Link
Learning to Extract Rational Evidence via Reinforcement Learning for Retrieval-Augmented Generation arXiv 2025 Link
LessLeak-Bench: A First Investigation of Data Leakage in LLMs Across 83 Software Engineering Benchmarks arXiv 2025 Link
LexGenius: An Expert-Level Benchmark for Large Language Models in Legal General Intelligence arXiv 2025 Link
Lightweight Deep Autoencoder for ECG Denoising with Morphology Preservation and Near Real-Time Hardware Deployment arXiv 2025 Link
Lita: Light Agent Uncovers the Agentic Coding Capabilities of LLMs arXiv 2025 Link
LiveTradeBench: Seeking Real-World Alpha with Large Language Models arXiv 2025 Link
LoRA-Leak: Membership Inference Attacks Against LoRA Fine-tuned Language Models arXiv 2025 Link
Local Information-Theoretic Security via Euclidean Geometry arXiv 2025 Link
Logit-Gap Steering: Efficient Short-Suffix Jailbreaks for Aligned Large Language Models arXiv 2025 Link
Lost in Modality: Evaluating the Effectiveness of Text-Based Membership Inference Attacks on Large Multimodal Models arXiv 2025 Link
Low Complexity Artificial Noise Aided Beam Focusing Design in Near-Field Terahertz Communications arXiv 2025 Link
Low-complexity Leakage Minimization Beamforming for Large-scale Multi-user Cell-Free Massive MIMO arXiv 2025 Link
LuxVeri at GenAI Detection Task 1: Inverse Perplexity Weighted Ensemble for Robust Detection of AI-Generated Text across English and Multilingual Contexts arXiv 2025 Link
MAGIA: Sensing Per-Image Signals from Single-Round Averaged Gradients for Label-Inference-Free Gradient Inversion arXiv 2025 Link
MAGPIE: A benchmark for Multi-AGent contextual PrIvacy Evaluation arXiv 2025 Link
MASS: Muli-agent simulation scaling for portfolio construction arXiv 2025 Link
MCTED: A Machine-Learning-Ready Dataset for Digital Elevation Model Generation From Mars Imagery arXiv 2025 Link
MER-Inspector: Assessing model extraction risks from an attack-agnostic perspective arXiv 2025 Link
METHOD: Modular Efficient Transformer for Health Outcome Discovery arXiv 2025 Link
MIMIC: Multimodal Inversion for Model Interpretation and Conceptualization arXiv 2025 Link
MLIP Arena: Advancing Fairness and Transparency in Machine Learning Interatomic Potentials via an Open, Accessible Benchmark Platform arXiv 2025 Link
MLLM-Based UI2Code Automation Guided by UI Layout Information arXiv 2025 Link
MTGR: Industrial-Scale Generative Recommendation Framework in Meituan arXiv 2025 Link
MURIM: Multidimensional Reputation-based Incentive Mechanism for Federated Learning arXiv 2025 Link
MagicDock: Toward Docking-oriented De Novo Ligand Design via Gradient Inversion arXiv 2025 Link
Mean-Variance Stackelberg Games with Asymmetric Information arXiv 2025 Link
Measuring Leakage in Concept-Based Methods: An Information Theoretic Approach arXiv 2025 Link
Mechanism Design with Information Leakage arXiv 2025 Link
MedForge: Building Medical Foundation Models Like Open Source Software Development arXiv 2025 Link
MedFoundationHub: A Lightweight and Secure Toolkit for Deploying Medical Vision Language Foundation Models arXiv 2025 Link
MedXpertQA: Benchmarking Expert-Level Medical Reasoning and Understanding arXiv 2025 Link
Membership Inference Attacks fueled by Few-Short Learning to detect privacy leakage tackling data integrity arXiv 2025 Link
Membership Inference Attacks on Sequence Models arXiv 2025 Link
Memories Retrieved from Many Paths: A Multi-Prefix Framework for Robust Detection of Training Data Leakage in Large Language Models arXiv 2025 Link
Memorization in 3D Shape Generation: An Empirical Study arXiv 2025 Link
Memorization in Language Models through the Lens of Intrinsic Dimension arXiv 2025 Link
Memory-Augmented Generative AI for Real-time Wireless Prediction in Dynamic Industrial Environments arXiv 2025 Link
Meta-Guardian: An Early Evaluation of an On-device Application to Mitigate Psychography Data Leakage in Immersive Technologies arXiv 2025 Link
Mimicking the Familiar: Dynamic Command Generation for Information Theft Attacks in LLM Tool-Learning System arXiv 2025 Link
Mini Diffuser: Fast Multi-task Diffusion Policy Training Using Two-level Mini-batches arXiv 2025 Link
Mitigating Cross-Image Information Leakage in LVLMs for Multi-Image Tasks arXiv 2025 Link
Mitigating Data Exfiltration Attacks through Layer-Wise Learning Rate Decay Fine-Tuning arXiv 2025 Link
Mitigating Privacy-Utility Trade-off in Decentralized Federated Learning via $f$-Differential Privacy arXiv 2025 Link
Mitigating Sensitive Information Leakage in LLMs4Code through Machine Unlearning arXiv 2025 Link
MoGA: 3D Generative Avatar Prior for Monocular Gaussian Avatar Reconstruction arXiv 2025 Link
Model Inversion Attack Against Deep Hashing arXiv 2025 Link
Model Inversion Attack against Federated Unlearning arXiv 2025 Link
Model Inversion Attacks Meet Cryptographic Fuzzy Extractors arXiv 2025 Link
Model Inversion Attacks on Llama 3: Extracting PII from Large Language Models arXiv 2025 Link
Model Inversion in Split Learning for Personalized LLMs: New Insights from Information Bottleneck Theory arXiv 2025 Link
Model Inversion with Layer-Specific Modeling and Alignment for Data-Free Continual Learning arXiv 2025 Link
Motus: A Unified Latent Action World Model arXiv 2025 Link
Multi-Agent Distributed Optimization With Feasible Set Privacy arXiv 2025 Link
Multi-Disease Deep Learning Framework for GWAS: Beyond Feature Selection Constraints arXiv 2025 Link
Multi-Hop Privacy Propagation for Differentially Private Federated Learning in Social Networks arXiv 2025 Link
Multi-Stage Prompt Inference Attacks on Enterprise LLM Systems arXiv 2025 Link
Multi-View Graph Feature Propagation for Privacy Preservation and Feature Sparsity arXiv 2025 Link
Multi-photon QKD for Practical Quantum Networks arXiv 2025 Link
Multimodal Deep Learning for Phyllodes Tumor Classification from Ultrasound and Clinical Data arXiv 2025 Link
Multiparty Authorization for Secure Data Storage in Cloud Environments using Improved Attribute-Based Encryption arXiv 2025 Link
Mutual Information Bounds in the Shuffle Model arXiv 2025 Link
Mutual Information Minimization for Side-Channel Attack Resistance via Optimal Noise Injection arXiv 2025 Link
NET-SA: An Efficient Secure Aggregation Architecture Based on In-Network Computing arXiv 2025 Link
Nash Equilibrium Between Consumer Electronic Devices and DoS Attacker for Distributed IoT-enabled RSE Systems arXiv 2025 Link
Near-field Liquid Crystal RIS Phase-Shift Design for Secure Wideband Illumination arXiv 2025 Link
Network Oblivious Transfer via Noisy Broadcast Channels arXiv 2025 Link
Network Structures as an Attack Surface: Topology-Based Privacy Leakage in Federated Learning arXiv 2025 Link
Neural Breadcrumbs: Membership Inference Attacks on LLMs Through Hidden State and Attention Pattern Analysis arXiv 2025 Link
Neural Estimation of Information Leakage for Secure Communication System Design arXiv 2025 Link
NoHumansRequired: Autonomous High-Quality Image Editing Triplet Mining arXiv 2025 Link
NoLBERT: A No Lookahead(back) Foundational Language Model arXiv 2025 Link
Non-Linear Trajectory Modeling for Multi-Step Gradient Inversion Attacks in Federated Learning arXiv 2025 Link
Nosy Layers, Noisy Fixes: Tackling DRAs in Federated Learning Systems using Explainable AI arXiv 2025 Link
OBELiX: A Curated Dataset of Crystal Structures and Experimentally Measured Ionic Conductivities for Lithium Solid-State Electrolytes arXiv 2025 Link
OPC: One-Point-Contraction Unlearning Toward Deep Feature Forgetting arXiv 2025 Link
ORQ: Complex Analytics on Private Data with Strong Security Guarantees arXiv 2025 Link
OS-Sentinel: Towards Safety-Enhanced Mobile GUI Agents via Hybrid Validation in Realistic Workflows arXiv 2025 Link
OTS-PC: OTS-based Payment Channels for the Lightning Network arXiv 2025 Link
Omni-Attribute: Open-vocabulary Attribute Encoder for Visual Concept Personalization arXiv 2025 Link
OmniFC: Rethinking Federated Clustering via Lossless and Secure Distance Reconstruction arXiv 2025 Link
On Secrecy Capacity of Binary Beampointing Channels with Block Memory and Feedback arXiv 2025 Link
On the Account Security Risks Posed by Password Strength Meters arXiv 2025 Link
On the Average Secrecy Performance of Satellite Networks in Short Packet Communication Systems arXiv 2025 Link
On the Detectability of Active Gradient Inversion Attacks in Federated Learning arXiv 2025 Link
On the Interplay of Privacy, Persuasion and Quantization arXiv 2025 Link
On the MIA Vulnerability Gap Between Private GANs and Diffusion Models arXiv 2025 Link
On the Necessity of Output Distribution Reweighting for Effective Class Unlearning arXiv 2025 Link
On the Privacy-Preserving Properties of Spiking Neural Networks with Unique Surrogate Gradients and Quantization Levels arXiv 2025 Link
On the de-duplication of the Lakh MIDI dataset arXiv 2025 Link
One-Bit Model Aggregation for Differentially Private and Byzantine-Robust Personalized Federated Learning arXiv 2025 Link
Opacity problems in multi-energy timed automata arXiv 2025 Link
OpenGuardrails: A Configurable, Unified, and Scalable Guardrails Platform for Large Language Models arXiv 2025 Link
Optimal Differentially Private Randomized Response Designs to Collect Sensitive Binary Data arXiv 2025 Link
Optimal Privacy-Preserving Distributed Median Consensus arXiv 2025 Link
Optimizing Indoor RIS-Aided Physical-Layer Security: A Codebook-Generation Methodology and Measurement-Based Analysis arXiv 2025 Link
Optimizing Leaky Private Information Retrieval Codes to Achieve ${O}(\log K)$ Leakage Ratio Exponent arXiv 2025 Link
Outsourcing SAT-based Verification Computations in Network Security arXiv 2025 Link
P3SL: Personalized Privacy-Preserving Split Learning on Heterogeneous Edge Devices arXiv 2025 Link
PAUSE: Low-Latency and Privacy-Aware Active User Selection for Federated Learning arXiv 2025 Link
PDSL: Privacy-Preserved Decentralized Stochastic Learning with Heterogeneous Data Distribution arXiv 2025 Link
PEEL the Layers and Find Yourself: Revisiting Inference-time Data Leakage for Residual Neural Networks arXiv 2025 Link
PIG: Privacy Jailbreak Attack on LLMs via Gradient-based Iterative In-Context Optimization arXiv 2025 Link
PII Jailbreaking in LLMs via Activation Steering Reveals Personal Information Leakage arXiv 2025 Link
POLARIS: Cross-Domain Access Control via Verifiable Identity and Policy-Based Authorization arXiv 2025 Link
PPFL-RDSN: Privacy-Preserving Federated Learning-based Residual Dense Spatial Networks for Encrypted Lossy Image Reconstruction arXiv 2025 Link
PPO-MI: Efficient Black-Box Model Inversion via Proximal Policy Optimization arXiv 2025 Link
PQBFL: A Post-Quantum Blockchain-based Protocol for Federated Learning arXiv 2025 Link
PRIVET: Privacy Metric Based on Extreme Value Theory arXiv 2025 Link
Partial Secrecy Analysis in Wireless Systems: Diversity-Enhanced PLS over Generalized Fading Channels arXiv 2025 Link
Patch Rebirth: Toward Fast and Transferable Model Inversion of Vision Transformers arXiv 2025 Link
PathBench: A comprehensive comparison benchmark for pathology foundation models towards precision oncology arXiv 2025 Link
Peekaboo, I See Your Queries: Passive Attacks Against DSSE Via Intermittent Observations arXiv 2025 Link
PerProb: Indirectly Evaluating Memorization in Large Language Models arXiv 2025 Link
Perfectly-Private Analog Secure Aggregation in Federated Learning arXiv 2025 Link
Personalized 3D Spatiotemporal Trajectory Privacy Protection with Differential and Distortion Geo-Perturbation arXiv 2025 Link
Personalized Risks and Regulatory Strategies of Large Language Models in Digital Advertising arXiv 2025 Link
PhantomWiki: On-Demand Datasets for Reasoning and Retrieval Evaluation arXiv 2025 Link
PhyAVBench: A Challenging Audio Physics-Sensitivity Benchmark for Physically Grounded Text-to-Audio-Video Generation arXiv 2025 Link
Physics informed Transformer-VAE for biophysical parameter estimation: PROSAIL model inversion in Sentinel-2 imagery arXiv 2025 Link
Physics-Inspired Distributed Radio Map Estimation arXiv 2025 Link
Pitfalls of Evaluating Language Models with Open Benchmarks arXiv 2025 Link
Plane Geometry Problem Solving with Multi-modal Reasoning: A Survey arXiv 2025 Link
PoSyn: Secure Power Side-Channel Aware Synthesis arXiv 2025 Link
Point-level Uncertainty Evaluation of Mobile Laser Scanning Point Clouds arXiv 2025 Link
Poison to Detect: Detection of Targeted Overfitting in Federated Learning arXiv 2025 Link
Policy Gradient Methods for Information-Theoretic Opacity in Markov Decision Processes arXiv 2025 Link
Power-Efficient Deceptive Wireless Beamforming Against Eavesdroppers arXiv 2025 Link
Power-consumption Backdoor in Quantum Key Distribution arXiv 2025 Link
Practical Feasibility of Gradient Inversion Attacks in Federated Learning arXiv 2025 Link
Practical Secure Inference Algorithm for Fine-tuned Large Language Model Based on Fully Homomorphic Encryption arXiv 2025 Link
Predicting Movie Success with Multi-Task Learning: A Hybrid Framework Combining GPT-Based Sentiment Analysis and SIR Propagation arXiv 2025 Link
Preserving Cross-Modal Stability for Visual Unlearning in Multimodal Scenarios arXiv 2025 Link
PrivCode: When Code Generation Meets Differential Privacy arXiv 2025 Link
PrivORL: Differentially Private Synthetic Dataset for Offline Reinforcement Learning arXiv 2025 Link
PrivTru: A Privacy-by-Design Data Trustee Minimizing Information Leakage arXiv 2025 Link
PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration arXiv 2025 Link
Privacy Attacks on Image AutoRegressive Models arXiv 2025 Link
Privacy Auditing Synthetic Data Release through Local Likelihood Attacks arXiv 2025 Link
Privacy Auditing of Large Language Models arXiv 2025 Link
Privacy Beyond Pixels: Latent Anonymization for Privacy-Preserving Video Understanding arXiv 2025 Link
Privacy Guarantee for Nash Equilibrium Computation of Aggregative Games Based on Pointwise Maximal Leakage arXiv 2025 Link
Privacy Leaks by Adversaries: Adversarial Iterations for Membership Inference Attack arXiv 2025 Link
Privacy Preservation in Gen AI Applications arXiv 2025 Link
Privacy Preserving Charge Location Prediction for Electric Vehicles arXiv 2025 Link
Privacy Preserving In-Context-Learning Framework for Large Language Models arXiv 2025 Link
Privacy Preserving Properties of Vision Classifiers arXiv 2025 Link
Privacy Risks of LLM-Empowered Recommender Systems: An Inversion Attack Perspective arXiv 2025 Link
Privacy in Action: Towards Realistic Privacy Mitigation and Evaluation for LLM-Powered Agents arXiv 2025 Link
Privacy in Federated Learning with Spiking Neural Networks arXiv 2025 Link
Privacy-Aware Decoding: Mitigating Privacy Leakage of Large Language Models in Retrieval-Augmented Generation arXiv 2025 Link
Privacy-Aware RAG: Secure and Isolated Knowledge Retrieval arXiv 2025 Link
Privacy-Aware Sharing of Raw Spatial Sensor Data for Cooperative Perception arXiv 2025 Link
Privacy-Preserving AI for Encrypted Medical Imaging: A Framework for Secure Diagnosis and Learning arXiv 2025 Link
Privacy-Preserving Dataset Combination arXiv 2025 Link
Privacy-Preserving Decentralized Federated Learning via Explainable Adaptive Differential Privacy arXiv 2025 Link
Privacy-Preserving Explainable AIoT Application via SHAP Entropy Regularization arXiv 2025 Link
Privacy-Preserving Federated Embedding Learning for Localized Retrieval-Augmented Generation arXiv 2025 Link
Privacy-Preserving Federated Learning Framework for Risk-Based Adaptive Authentication arXiv 2025 Link
Privacy-Preserving Federated Vision Transformer Learning Leveraging Lightweight Homomorphic Encryption in Medical AI arXiv 2025 Link
Privacy-Preserving Fully Distributed Gaussian Process Regression arXiv 2025 Link
Privacy-Preserving Peer-to-Peer Energy Trading via Hybrid Secure Computations arXiv 2025 Link
Privacy-Preserving Reasoning with Knowledge-Distilled Parametric Retrieval Augmented Generation arXiv 2025 Link
Privacy-Preserving State Estimation with Crowd Sensors: An Information-Theoretic Respective arXiv 2025 Link
Privacy-Utility-Fairness: A Balanced Approach to Vehicular-Traffic Management System arXiv 2025 Link
Privacy-aware Berrut Approximated Coded Computing applied to general distributed learning arXiv 2025 Link
PrivacyPAD: A Reinforcement Learning Framework for Dynamic Privacy-Aware Delegation arXiv 2025 Link
Private From Whom? Minimal Information Leakage in Auctions arXiv 2025 Link
Private Memorization Editing: Turning Memorization into a Defense to Strengthen Data Privacy in Large Language Models arXiv 2025 Link
Private Remote Phase Estimation over a Lossy Quantum Channel arXiv 2025 Link
Private Sketches for Linear Regression arXiv 2025 Link
Private and Fair Machine Learning: Revisiting the Disparate Impact of Differentially Private SGD arXiv 2025 Link
Probability Distribution Alignment and Low-Rank Weight Decomposition for Source-Free Domain Adaptive Brain Decoding arXiv 2025 Link
Profit Mirage: Revisiting Information Leakage in LLM-based Financial Agents arXiv 2025 Link
Progent: Programmable Privilege Control for LLM Agents arXiv 2025 Link
Prompt Inversion Attack against Collaborative Inference of Large Language Models arXiv 2025 Link
Prostate-VarBench: A Benchmark with Interpretable TabNet Framework for Prostate Cancer Variant Classification arXiv 2025 Link
Protecting Bystander Privacy via Selective Hearing in Audio LLMs arXiv 2025 Link
Provably Near-Optimal Federated Ensemble Distillation with Negligible Overhead arXiv 2025 Link
Provably Secure Retrieval-Augmented Generation arXiv 2025 Link
Public Data Assisted Differentially Private In-Context Learning arXiv 2025 Link
Quantifying Privacy Leakage in Split Inference via Fisher-Approximated Shannon Information Analysis arXiv 2025 Link
Quantifying Source Speaker Leakage in One-to-One Voice Conversion arXiv 2025 Link
Quantifying the Privacy Implications of High-Fidelity Synthetic Network Traffic arXiv 2025 Link
Quantized-Tinyllava: a new multimodal foundation model enables efficient split learning arXiv 2025 Link
Quantum Computing Supported Adversarial Attack-Resilient Autonomous Vehicle Perception Module for Traffic Sign Classification arXiv 2025 Link
Quantum-Inspired Privacy-Preserving Federated Learning Framework for Secure Dementia Classification arXiv 2025 Link
REMIND: Input Loss Landscapes Reveal Residual Memorization in Post-Unlearning LLMs arXiv 2025 Link
RESFL: An Uncertainty-Aware Framework for Responsible Federated Learning by Balancing Privacy, Fairness and Utility in Autonomous Vehicles arXiv 2025 Link
REVAL: A Comprehension Evaluation on Reliability and Values of Large Vision-Language Models arXiv 2025 Link
RIDE: Difficulty Evolving Perturbation with Item Response Theory for Mathematical Reasoning arXiv 2025 Link
RPKI-Based Location-Unaware Tor Guard Relay Selection Algorithms arXiv 2025 Link
RTBAS: Defending LLM Agents Against Prompt Injection and Privacy Leakage arXiv 2025 Link
Random Client Selection on Contrastive Federated Learning for Tabular Data arXiv 2025 Link
Randomness quantification in spontaneous emission arXiv 2025 Link
ReCIT: Reconstructing Full Private Data from Gradient in Parameter-Efficient Fine-Tuning of Large Language Models arXiv 2025 Link
Real-Time Privacy Risk Measurement with Privacy Tokens for Gradient Leakage arXiv 2025 Link
Real-time ML-based Defense Against Malicious Payload in Reconfigurable Embedded Systems arXiv 2025 Link
Reasoning Model Unlearning: Forgetting Traces, Not Just Answers, While Preserving Reasoning Skills arXiv 2025 Link
RecRankerEval: A Flexible and Extensible Framework for Top-k LLM-based Recommendation arXiv 2025 Link
Recursive Privacy-Preserving Estimation Over Markov Fading Channels arXiv 2025 Link
Repair Ingredients Are All You Need: Improving Large Language Model-Based Program Repair via Repair Ingredients Search arXiv 2025 Link
Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs arXiv 2025 Link
Reply to "Emergent LLM behaviors are observationally equivalent to data leakage" arXiv 2025 Link
Reproducibility Study of Cooperation, Competition, and Maliciousness: LLM-Stakeholders Interactive Negotiation arXiv 2025 Link
Reproducibility and Artifact Consistency of the SIGIR 2022 Recommender Systems Papers Based on Message Passing arXiv 2025 Link
Research on Large Language Model Cross-Cloud Privacy Protection and Collaborative Training based on Federated Learning arXiv 2025 Link
Research on the Design of a Short Video Recommendation System Based on Multimodal Information and Differential Privacy arXiv 2025 Link
Residual Reweighted Conformal Prediction for Graph Neural Networks arXiv 2025 Link
Rethinking Evaluation in the Era of Time Series Foundation Models: (Un)known Information Leakage Challenges arXiv 2025 Link
Rethinking Federated Learning Over the Air: The Blessing of Scaling Up arXiv 2025 Link
Rethinking Inference Placement for Deep Learning across Edge and Cloud Platforms: A Multi-Objective Optimization Perspective and Future Directions arXiv 2025 Link
Rethinking Post-Unlearning Behavior of Large Vision-Language Models arXiv 2025 Link
Rethinking Text-based Protein Understanding: Retrieval or LLM? arXiv 2025 Link
Revealing Unintentional Information Leakage in Low-Dimensional Facial Portrait Representations arXiv 2025 Link
Revisiting Gradient-based Uncertainty for Monocular Depth Estimation arXiv 2025 Link
Revisiting Locally Differentially Private Protocols: Towards Better Trade-offs in Privacy, Utility, and Attack Resistance arXiv 2025 Link
Revisiting Model Inversion Evaluation: From Misleading Standards to Reliable Privacy Assessment arXiv 2025 Link
Revisiting Pre-trained Language Models for Vulnerability Detection arXiv 2025 Link
Risk In Context: Benchmarking Privacy Leakage of Foundation Models in Synthetic Tabular Data Generation arXiv 2025 Link
Risk-Aware Sensitive Property-Driven Resource Management in Cloud Datacenters arXiv 2025 Link
Robust Full-Space Physical Layer Security for STAR-RIS-Aided Wireless Networks: Eavesdropper with Uncertain Location and Channel arXiv 2025 Link
Robust Watermarks Leak: Channel-Aware Feature Extraction Enables Adversarial Watermark Manipulation arXiv 2025 Link
RobustMerge: Parameter-Efficient Model Merging for MLLMs with Direction Robustness arXiv 2025 Link
RodEpil: A Video Dataset of Laboratory Rodents for Seizure Detection and Benchmark Evaluation arXiv 2025 Link
RouterKT: Mixture-of-Experts for Knowledge Tracing arXiv 2025 Link
SAFE: Self-Adjustment Federated Learning Framework for Remote Sensing Collaborative Perception arXiv 2025 Link
SALT: Steering Activations towards Leakage-free Thinking in Chain of Thought arXiv 2025 Link
SALTY: Explainable Artificial Intelligence Guided Structural Analysis for Hardware Trojan Detection arXiv 2025 Link
SECNEURON: Reliable and Flexible Abuse Control in Local LLMs via Hybrid Neuron Encryption arXiv 2025 Link
SG-OIF: A Stability-Guided Online Influence Framework for Reliable Vision Data arXiv 2025 Link
SHALE: A Scalable Benchmark for Fine-grained Hallucination Evaluation in LVLMs arXiv 2025 Link
SHE-LoRA: Selective Homomorphic Encryption for Federated Tuning with Heterogeneous LoRA arXiv 2025 Link
SLVC-DIDA: Signature-less Verifiable Credential-based Issuer-hiding and Multi-party Authentication for Decentralized Identity arXiv 2025 Link
SMA: Who Said That? Auditing Membership Leakage in Semi-Black-box RAG Controlling arXiv 2025 Link
SMOTE and Mirrors: Exposing Privacy Leakage from Synthetic Minority Oversampling arXiv 2025 Link
SMTFL: Secure Model Training to Untrusted Participants in Federated Learning arXiv 2025 Link
SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks arXiv 2025 Link
SPADE: Spatial-Aware Denoising Network for Open-vocabulary Panoptic Scene Graph Generation with Long- and Local-range Context Reasoning arXiv 2025 Link
SPATA: Systematic Pattern Analysis for Detailed and Transparent Data Cards arXiv 2025 Link
SPEAR++: Scaling Gradient Inversion via Sparsely-Used Dictionary Learning arXiv 2025 Link
SPLICE: Part-Level 3D Shape Editing from Local Semantic Extraction to Global Neural Mixing arXiv 2025 Link
SVDefense: Effective Defense against Gradient Inversion Attacks via Singular Value Decomposition arXiv 2025 Link
Safe and Certifiable AI Systems: Concepts, Challenges, and Lessons Learned arXiv 2025 Link
SafeToolBench: Pioneering a Prospective Benchmark to Evaluating Tool Utilization Safety in LLMs arXiv 2025 Link
Safeguard-by-Development: A Privacy-Enhanced Development Paradigm for Multi-Agent Collaboration Systems arXiv 2025 Link
Safeguarding LLM Embeddings in End-Cloud Collaboration via Entropy-Driven Perturbation arXiv 2025 Link
Sanitize Your Responses: Mitigating Privacy Leakage in Large Language Models arXiv 2025 Link
SceneTextStylizer: A Training-Free Scene Text Style Transfer Framework with Diffusion Model arXiv 2025 Link
Score Augmentation for Diffusion Models arXiv 2025 Link
Secret Sharing for DNA Probability Vectors arXiv 2025 Link
Secret-Key Generation from Private Identifiers under Channel Uncertainty arXiv 2025 Link
Secure Generalization through Stochastic Bidirectional Parameter Updates Using Dual-Gradient Mechanism arXiv 2025 Link
Secure Multi-LLM Agentic AI and Agentification for Edge General Intelligence by Zero-Trust: A Survey arXiv 2025 Link
Secure Multifaceted-RAG for Enterprise: Hybrid Knowledge Retrieval with Security Filtering arXiv 2025 Link
Secure and Privacy-Preserving Federated Learning for Next-Generation Underground Mine Safety arXiv 2025 Link
Securing 5G Bootstrapping: A Two-Layer IBS Authentication Protocol arXiv 2025 Link
Securing AI Systems: A Guide to Known Attacks and Impacts arXiv 2025 Link
Securing P4 Programs by Information Flow Control arXiv 2025 Link
Security Audit of intel ICE Driver for e810 Network Interface Card arXiv 2025 Link
Security-aware Semantic-driven ISAC via Paired Adversarial Residual Networks arXiv 2025 Link
Self-Supervised Temporal Super-Resolution of Energy Data using Generative Adversarial Transformer arXiv 2025 Link
Selling Privacy in Blockchain Transactions arXiv 2025 Link
SemCovert: Secure and Covert Video Transmission via Deep Semantic-Level Hiding arXiv 2025 Link
SemiOccam: A Robust Semi-Supervised Image Recognition Network Using Sparse Labels arXiv 2025 Link
SenseCrypt: Sensitivity-guided Selective Homomorphic Encryption for Joint Federated Learning in Cross-Device Scenarios arXiv 2025 Link
Several Representations of $α$-Mutual Information and Interpretations as Privacy Leakage Measures arXiv 2025 Link
Shadow defense against gradient inversion attack in federated learning arXiv 2025 Link
Shadow in the Cache: Unveiling and Mitigating Privacy Risks of KV-cache in LLM Inference arXiv 2025 Link
Sim-to-Real: An Unsupervised Noise Layer for Screen-Camera Watermarking Robustness arXiv 2025 Link
Simple Yet Effective: Extracting Private Data Across Clients in Federated Fine-Tuning of Large Language Models arXiv 2025 Link
Simulating Pattern Recognition Using Non-volatile Synapses: MRAM, Ferroelectrics and Magnetic Skyrmions arXiv 2025 Link
Simulating Training Data Leakage in Multiple-Choice Benchmarks for LLM Evaluation arXiv 2025 Link
Situating AI Agents in their World: Aspective Agentic AI for Dynamic Partially Observable Information Systems arXiv 2025 Link
Smooth, Integrated Proofs of Cryptographic Constant Time for Nondeterministic Programs and Compilers arXiv 2025 Link
SoK: The Privacy Paradox of Large Language Models: Advancements, Privacy Risks, and Mitigation arXiv 2025 Link
SoK: Understanding (New) Security Issues Across AI4Code Use Cases arXiv 2025 Link
Soiling detection for Advanced Driver Assistance Systems arXiv 2025 Link
Sparse Latent Factor Forecaster (SLFF) with Iterative Inference for Transparent Multi-Horizon Commodity Futures Prediction arXiv 2025 Link
Sparse Model Inversion: Efficient Inversion of Vision Transformers for Data-Free Applications arXiv 2025 Link
Split Happens: Combating Advanced Threats with Split Learning and Function Secret Sharing arXiv 2025 Link
Spurious Privacy Leakage in Neural Networks arXiv 2025 Link
Stealing Training Data from Large Language Models in Decentralized Training through Activation Inversion Attack arXiv 2025 Link
StegaVAR: Privacy-Preserving Video Action Recognition via Steganographic Domain Analysis arXiv 2025 Link
Step-by-Step Reasoning Attack: Revealing 'Erased' Knowledge in Large Language Models arXiv 2025 Link
Steps Adaptive Decay DPSGD: Enhancing Performance on Imbalanced Datasets with Differential Privacy with HAM10000 arXiv 2025 Link
Strategic Incentivization for Locally Differentially Private Federated Learning arXiv 2025 Link
Structural Enforcement of Statistical Rigor in AI-Driven Discovery: A Functional Architecture arXiv 2025 Link
SurvBench: A Standardised Preprocessing Pipeline for Multi-Modal Electronic Health Record Survival Analysis arXiv 2025 Link
Synth-MIA: A Testbed for Auditing Privacy Leakage in Tabular Data Synthesis arXiv 2025 Link
SynthTextEval: Synthetic Text Data Generation and Evaluation for High-Stakes Domains arXiv 2025 Link
Synthesis of Dynamic Masks for Information-Theoretic Opacity in Stochastic Systems arXiv 2025 Link
Synthetic Data Can Mislead Evaluations: Membership Inference as Machine Text Detection arXiv 2025 Link
System Prompt Poisoning: Persistent Attacks on Large Language Models Beyond User Injection arXiv 2025 Link
TCC-Bench: Benchmarking the Traditional Chinese Culture Understanding Capabilities of MLLMs arXiv 2025 Link
TEE-based Key-Value Stores: a Survey arXiv 2025 Link
TRIDENT -- A Three-Tier Privacy-Preserving Propaganda Detection Model in Mobile Networks using Transformers, Adversarial Learning, and Differential Privacy arXiv 2025 Link
TS-Arena -- A Live Forecast Pre-Registration Platform arXiv 2025 Link
TS-Inverse: A Gradient Inversion Attack Tailored for Federated Time Series Forecasting Models arXiv 2025 Link
TTSDS2: Resources and Benchmark for Evaluating Human-Quality Text to Speech Systems arXiv 2025 Link
TabDSR: Decompose, Sanitize, and Reason for Complex Numerical Reasoning in Tabular Data arXiv 2025 Link
TableEval: A Real-World Benchmark for Complex, Multilingual, and Multi-Structured Table Question Answering arXiv 2025 Link
Tag&Tab: Pretraining Data Detection in Large Language Models Using Keyword-Based Membership Inference Attack arXiv 2025 Link
Teach2Eval: An Indirect Evaluation Method for LLM by Judging How It Teaches arXiv 2025 Link
Term2Note: Synthesising Differentially Private Clinical Notes from Medical Terms arXiv 2025 Link
TextCrafter: Optimization-Calibrated Noise for Defending Against Text Embedding Inversion arXiv 2025 Link
The DCR Delusion: Measuring the Privacy Risk of Synthetic Data arXiv 2025 Link
The Decrypto Benchmark for Multi-Agent Reasoning and Theory of Mind arXiv 2025 Link
The Double-Edged Nature of the Rashomon Set for Trustworthy Machine Learning arXiv 2025 Link
The Ever-Evolving Science Exam arXiv 2025 Link
The Hidden Cost of Correlation: Rethinking Privacy Leakage in Local Differential Privacy arXiv 2025 Link
The Impact of Logic Locking on Confidentiality: An Automated Evaluation arXiv 2025 Link
The Inverse Scaling Effect of Pre-Trained Language Model Surprisal Is Not Due to Data Leakage arXiv 2025 Link
The Layout Is the Model: On Action-Item Coupling in Generative Recommendation arXiv 2025 Link
The Model's Language Matters: A Comparative Privacy Analysis of LLMs arXiv 2025 Link
The More You Automate, the Less You See: Hidden Pitfalls of AI Scientist Systems arXiv 2025 Link
The More is not the Merrier: Investigating the Effect of Client Size on Federated Learning arXiv 2025 Link
The Role of Review Process Failures in Affective State Estimation: An Empirical Investigation of DEAP Dataset arXiv 2025 Link
The Sum Leaks More Than Its Parts: Compositional Privacy Risks and Mitigations in Multi-Agent Collaboration arXiv 2025 Link
The Surprising Effectiveness of Membership Inference with Simple N-Gram Coverage arXiv 2025 Link
The role of data partitioning on the performance of EEG-based deep learning models in supervised cross-subject analysis: a preliminary study arXiv 2025 Link
Theoretical Insights in Model Inversion Robustness and Conditional Entropy Maximization for Collaborative Inference Systems arXiv 2025 Link
Thermal-Aware 3D Design for Side-Channel Information Leakage arXiv 2025 Link
ThinkBench: Dynamic Out-of-Distribution Evaluation for Robust LLM Reasoning arXiv 2025 Link
Tight Inversion: Image-Conditioned Inversion for Real Image Editing arXiv 2025 Link
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems arXiv 2025 Link
Time Travel is Cheating: Going Live with DeepFund for Real-Time Fund Investment Benchmarking arXiv 2025 Link
Towards Adversarial Robustness and Uncertainty Quantification in DINOv2-based Few-Shot Anomaly Detection arXiv 2025 Link
Towards Automated Self-Supervised Learning for Truly Unsupervised Graph Anomaly Detection arXiv 2025 Link
Towards Benchmarking Privacy Vulnerabilities in Selective Forgetting with Large Language Models arXiv 2025 Link
Towards Cross-Domain Multi-Targeted Adversarial Attacks arXiv 2025 Link
Towards Federated Clustering: A Client-wise Private Graph Aggregation Framework arXiv 2025 Link
Towards Human-Centered RegTech: Unpacking Professionals' Strategies and Needs for Using LLMs Safely arXiv 2025 Link
Towards Secure Program Partitioning for Smart Contracts with LLM's In-Context Learning arXiv 2025 Link
Towards Secure Semantic Communications in the Presence of Intelligent Eavesdroppers arXiv 2025 Link
Towards a more realistic evaluation of machine learning models for bearing fault diagnosis arXiv 2025 Link
Towards hyperparameter-free optimization with differential privacy arXiv 2025 Link
Towards mitigating information leakage when evaluating safety monitors arXiv 2025 Link
Tracking the Moving Target: A Framework for Continuous Evaluation of LLM Test Generation in Industry arXiv 2025 Link
Training nonlinear optical neural networks with Scattering Backpropagation arXiv 2025 Link
Transform Before You Query: A Privacy-Preserving Approach for Vector Retrieval with Embedding Space Alignment arXiv 2025 Link
Trusted AI Agents in the Cloud arXiv 2025 Link
Trustformer: A Trusted Federated Transformer arXiv 2025 Link
Trustworthy Efficient Communication for Distributed Learning using LQ-SGD Algorithm arXiv 2025 Link
Twin Peaks: Dual-Head Architecture for Structure-Free Prediction of Protein-Protein Binding Affinity and Mutation Effects arXiv 2025 Link
UGPhysics: A Comprehensive Benchmark for Undergraduate Physics Reasoning with Large Language Models arXiv 2025 Link
Unbiased estimation in one-parameter exponential families for the inverse of the natural parameter with extensions arXiv 2025 Link
Uncovering Gradient Inversion Risks in Practical Language Model Training arXiv 2025 Link
Uncovering Privacy Vulnerabilities through Analytical Gradient Inversion Attacks arXiv 2025 Link
Understanding and Mitigating Cross-lingual Privacy Leakage via Language-specific and Universal Privacy Neurons arXiv 2025 Link
Understanding the Mechanisms Behind Structural Influences on Link Prediction: A Case Study on FB15k-237 arXiv 2025 Link
Understanding the Security Landscape of Embedded Non-Volatile Memories: A Comprehensive Survey arXiv 2025 Link
Uniqueness ratio as a predictor of a privacy leakage arXiv 2025 Link
Unlearned but Not Forgotten: Data Extraction after Exact Unlearning in LLM arXiv 2025 Link
Unlearning Inversion Attacks for Graph Neural Networks arXiv 2025 Link
Unmasking the Genuine Type Inference Capabilities of LLMs for Java Code Snippets arXiv 2025 Link
Unveiling Client Privacy Leakage from Public Dataset Usage in Federated Distillation arXiv 2025 Link
Using the NANDA Index Architecture in Practice: An Enterprise Perspective arXiv 2025 Link
VAR-MATH: Probing True Mathematical Reasoning in LLMS via Symbolic Multi-Instance Benchmarks arXiv 2025 Link
VFEFL: Privacy-Preserving Federated Learning against Malicious Clients via Verifiable Functional Encryption arXiv 2025 Link
VFXMaster: Unlocking Dynamic Visual Effect Generation via In-Context Learning arXiv 2025 Link
VMDNet: Time Series Forecasting with Leakage-Free Samplewise Variational Mode Decomposition and Multibranch Decoding arXiv 2025 Link
Validating Vision Transformers for Otoscopy: Performance and Data-Leakage Effects arXiv 2025 Link
Variational Secret Common Randomness Extraction arXiv 2025 Link
Verifiable, Efficient and Confidentiality-Preserving Graph Search with Transparency arXiv 2025 Link
Verification of Lightning Network Channel Balances with Trusted Execution Environments (TEE) arXiv 2025 Link
VoxGuard: Evaluating User and Attribute Privacy in Speech via Membership Inference Attacks arXiv 2025 Link
WarmFed: Federated Learning with Warm-Start for Globalization and Personalization Via Personalized Diffusion Models arXiv 2025 Link
WavShape: Information-Theoretic Speech Representation Learning for Fair and Privacy-Aware Audio Processing arXiv 2025 Link
Weakly Supervised Pneumonia Localization from Chest X-Rays Using Deep Neural Network and Grad-CAM Explanations arXiv 2025 Link
What Your Features Reveal: Data-Efficient Black-Box Feature Inversion Attack for Split DNNs arXiv 2025 Link
When Better Features Mean Greater Risks: The Performance-Privacy Trade-Off in Contrastive Learning arXiv 2025 Link
When MoE Meets Blockchain: A Trustworthy Distributed Framework of Large Models arXiv 2025 Link
When Privacy Isn't Synthetic: Hidden Data Leakage in Generative AI Models arXiv 2025 Link
When Privacy Meets Recovery: The Overlooked Half of Surrogate-Driven Privacy Preservation for MLLM Editing arXiv 2025 Link
When Secure Aggregation Falls Short: Achieving Long-Term Privacy in Asynchronous Federated Learning for LEO Satellite Networks arXiv 2025 Link
When Tables Leak: Attacking String Memorization in LLM-Based Tabular Data Generation arXiv 2025 Link
Who's Wearing? Ear Canal Biometric Key Extraction for User Authentication on Wireless Earbuds arXiv 2025 Link
Will LLMs be Professional at Fund Investment? DeepFund: A Live Arena Perspective arXiv 2025 Link
YOLO-IOD: Towards Real Time Incremental Object Detection arXiv 2025 Link
You Have Been LaTeXpOsEd: A Systematic Analysis of Information Leakage in Preprint Archives Using Large Language Models arXiv 2025 Link
ZTFed-MAS2S: A Zero-Trust Federated Learning Framework with Verifiable Privacy and Trust-Aware Aggregation for Wind Power Data Imputation arXiv 2025 Link
Zk-SNARK for String Match arXiv 2025 Link
zkFL-Health: Blockchain-Enabled Zero-Knowledge Federated Learning for Medical AI Privacy arXiv 2025 Link

2024

Title Venue Year Link
"Ghost of the past": identifying and resolving privacy leakage from LLM's memory through proactive user interaction arXiv 2024 Link
"The teachers are confused as well": A Multiple-Stakeholder Ethics Discussion on Large Language Models in Computing Education arXiv 2024 Link
"What do you want from theory alone?" Experimenting with Tight Auditing of Differentially Private Synthetic Data Generation arXiv 2024 Link
2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures arXiv 2024 Link
500xCompressor: Generalized Prompt Compression for Large Language Models arXiv 2024 Link
A Benchmark for Multi-speaker Anonymization arXiv 2024 Link
A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion Attacks arXiv 2024 Link
A Computational Harmonic Detection Algorithm to Detect Data Leakage through EM Emanation arXiv 2024 Link
A Curious Case of Remarkable Resilience to Gradient Attacks via Fully Convolutional and Differentiable Front End with a Skip Connection arXiv 2024 Link
A Data-Driven Modeling and Motion Control of Heavy-Load Hydraulic Manipulators via Reversible Transformation arXiv 2024 Link
A Deep Learning Approach for Trading Factor Residuals arXiv 2024 Link
A Differentially Private Quantum Neural Network for Probabilistic Optimal Power Flow arXiv 2024 Link
A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data Storage arXiv 2024 Link
A Framework for Managing Multifaceted Privacy Leakage While Optimizing Utility in Continuous LBS Interactions arXiv 2024 Link
A Hybrid Quantum Neural Network for Split Learning arXiv 2024 Link
A Large-scale Empirical Study on Fine-tuning Large Language Models for Unit Testing arXiv 2024 Link
A Little Leak Will Sink a Great Ship: Survey of Transparency for Large Language Models from Start to Finish arXiv 2024 Link
A Low-Cost Multi-Band Waveform Security Framework in Resource-Constrained Communications arXiv 2024 Link
A Method to Facilitate Membership Inference Attacks in Deep Learning Models arXiv 2024 Link
A Multi-Faceted Evaluation Framework for Assessing Synthetic Data Generated by Large Language Models arXiv 2024 Link
A New Achievable Region of the $K$-User MAC Wiretap Channel with Confidential and Open Messages Under Strong Secrecy arXiv 2024 Link
A New Federated Learning Framework Against Gradient Inversion Attacks arXiv 2024 Link
A Novel Review of Stability Techniques for Improved Privacy-Preserving Machine Learning arXiv 2024 Link
A Practical Trigger-Free Backdoor Attack on Neural Networks arXiv 2024 Link
A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web arXiv 2024 Link
A Privacy-Preserving Framework with Multi-Modal Data for Cross-Domain Recommendation arXiv 2024 Link
A Public and Reproducible Assessment of the Topics API on Real Data arXiv 2024 Link
A Qualitative Analysis Framework for mHealth Privacy Practices arXiv 2024 Link
A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality arXiv 2024 Link
A Quantum Key Distribution System for Mobile Platforms with Highly Indistinguishable States arXiv 2024 Link
A Simple Architecture for Enterprise Large Language Model Applications based on Role based security and Clearance Levels using Retrieval-Augmented Generation or Mixture of Experts arXiv 2024 Link
A Study of Secure Algorithms for Vertical Federated Learning: Take Secure Logistic Regression as an Example arXiv 2024 Link
A Superposition Code-Based Semantic Communication Approach with Quantifiable and Controllable Security arXiv 2024 Link
A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions arXiv 2024 Link
A Survey on Machine Unlearning: Techniques and New Emerged Privacy Risks arXiv 2024 Link
A Survey on Privacy Attacks Against Digital Twin Systems in AI-Robotics arXiv 2024 Link
A Survey on Privacy-Preserving Caching at Network Edge: Classification, Solutions, and Challenges arXiv 2024 Link
A Systematic Literature Review on Reasons and Approaches for Accurate Effort Estimations in Agile arXiv 2024 Link
A Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time Pad arXiv 2024 Link
A Unified Solution to Diverse Heterogeneities in One-shot Federated Learning arXiv 2024 Link
A Variational Characterization of $H$-Mutual Information and its Application to Computing $H$-Capacity arXiv 2024 Link
A code-driven tutorial on encrypted control: From pioneering realizations to modern implementations arXiv 2024 Link
A new "temperature inversion" estimator to detect CMB patchy screening by large-scale structure arXiv 2024 Link
ACCESS-FL: Agile Communication and Computation for Efficient Secure Aggregation in Stable Federated Learning Networks arXiv 2024 Link
AFGI: Towards Accurate and Fast-convergent Gradient Inversion Attack in Federated Learning arXiv 2024 Link
AGSOA:Graph Neural Network Targeted Attack Based on Average Gradient and Structure Optimization arXiv 2024 Link
AI in Investment Analysis: LLMs for Equity Stock Ratings arXiv 2024 Link
ANGO: A Next-Level Evaluation Benchmark For Generation-Oriented Language Models In Chinese Domain arXiv 2024 Link
Act Now: A Novel Online Forecasting Framework for Large-Scale Streaming Data arXiv 2024 Link
Active Perception with Initial-State Uncertainty: A Policy Gradient Method arXiv 2024 Link
Adaptive Coding for Two-Way Wiretap Channel under Strong Secrecy arXiv 2024 Link
Adaptive Hybrid Masking Strategy for Privacy-Preserving Face Recognition Against Model Inversion Attack arXiv 2024 Link
Adaptive and Parallel Split Federated Learning in Vehicular Edge Computing arXiv 2024 Link
Addressing Data Leakage in HumanEval Using Combinatorial Test Design arXiv 2024 Link
Addressing Key Challenges of Adversarial Attacks and Defenses in the Tabular Domain: A Methodological Framework for Coherence and Consistency arXiv 2024 Link
Advancements in Recommender Systems: A Comprehensive Analysis Based on Data, Algorithms, and Evaluation arXiv 2024 Link
Adversarial Machine Learning-Enabled Anonymization of OpenWiFi Data arXiv 2024 Link
Against All Odds: Overcoming Typology, Script, and Language Confusion in Multilingual Embedding Inversion Attacks arXiv 2024 Link
Agile gesture recognition for low-power applications: customisation for generalisation arXiv 2024 Link
AirGapAgent: Protecting Privacy-Conscious Conversational Agents arXiv 2024 Link
Alopex: A Computational Framework for Enabling On-Device Function Calls with LLMs arXiv 2024 Link
An Empirical Study of Vulnerability Detection using Federated Learning arXiv 2024 Link
An Improved Metric and Benchmark for Assessing the Performance of Virtual Screening Models arXiv 2024 Link
Analysis of Privacy Leakage in Federated Large Language Models arXiv 2024 Link
Analyzing Inference Privacy Risks Through Gradients in Machine Learning arXiv 2024 Link
Anatomical 3D Style Transfer Enabling Efficient Federated Learning with Extremely Low Communication Costs arXiv 2024 Link
AnonyNoise: Anonymizing Event Data with Smart Noise to Outsmart Re-Identification and Preserve Privacy arXiv 2024 Link
AnyFit: Controllable Virtual Try-on for Any Combination of Attire Across Any Scenario arXiv 2024 Link
Approximated Coded Computing: Towards Fast, Private and Secure Distributed Machine Learning arXiv 2024 Link
Are Large Language Models Memorizing Bug Benchmarks? arXiv 2024 Link
Are Neuromorphic Architectures Inherently Privacy-preserving? An Exploratory Study arXiv 2024 Link
Are We on the Right Way for Evaluating Large Vision-Language Models? arXiv 2024 Link
ArtNVG: Content-Style Separated Artistic Neighboring-View Gaussian Stylization arXiv 2024 Link
Assessing Gender Bias in LLMs: Comparing LLM Outputs with Human Perceptions and Official Statistics arXiv 2024 Link
Assessing Privacy Compliance of Android Third-Party SDKs arXiv 2024 Link
Asynchronous Byzantine Federated Learning arXiv 2024 Link
Asynchronous Federated Stochastic Optimization for Heterogeneous Objectives Under Arbitrary Delays arXiv 2024 Link
Attack-Aware Noise Calibration for Differential Privacy arXiv 2024 Link
Attribute Inference Attacks for Federated Regression Tasks arXiv 2024 Link
Audio-Language Datasets of Scenes and Events: A Survey arXiv 2024 Link
Auditing Private Prediction arXiv 2024 Link
Augmented two-stage estimation for treatment crossover in oncology trials: Leveraging external data for improved precision arXiv 2024 Link
AutoPT: How Far Are We from the End2End Automated Web Penetration Testing? arXiv 2024 Link
BAZAM: A Blockchain-Assisted Zero-Trust Authentication in Multi-UAV Wireless Networks arXiv 2024 Link
BGTplanner: Maximizing Training Accuracy for Differentially Private Federated Recommenders via Strategic Privacy Budget Allocation arXiv 2024 Link
BWArea Model: Learning World Model, Inverse Dynamics, and Policy for Controllable Language Generation arXiv 2024 Link
Balancing Innovation and Privacy: Data Security Strategies in Natural Language Processing Applications arXiv 2024 Link
Barycentric and Pairwise Renyi Quantum Leakage arXiv 2024 Link
Bayesian D-Optimal Experimental Designs via Column Subset Selection arXiv 2024 Link
Benchmarking Benchmark Leakage in Large Language Models arXiv 2024 Link
Benchmarking LLMs' Judgments with No Gold Standard arXiv 2024 Link
Benchmarking Secure Sampling Protocols for Differential Privacy arXiv 2024 Link
Benchmarking deep learning models for bearing fault diagnosis using the CWRU dataset: A multi-label approach arXiv 2024 Link
Better Membership Inference Privacy Measurement through Discrepancy arXiv 2024 Link
Blockchain-Enabled Variational Information Bottleneck for Data Extraction Based on Mutual Information in Internet of Vehicles arXiv 2024 Link
Boosting Communication Efficiency of Federated Learning's Secure Aggregation arXiv 2024 Link
Boosting Spatial-Spectral Masked Auto-Encoder Through Mining Redundant Spectra for HSI-SAR/LiDAR Classification arXiv 2024 Link
Bounding Causal Effects with Leaky Instruments arXiv 2024 Link
BrainLeaks: On the Privacy-Preserving Properties of Neuromorphic Architectures against Model Inversion Attacks arXiv 2024 Link
Breach By A Thousand Leaks: Unsafe Information Leakage in `Safe' AI Responses arXiv 2024 Link
Breaking Resource Barriers in Speech Emotion Recognition via Data Distillation arXiv 2024 Link
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning arXiv 2024 Link
Breaking the Black-Box: Confidence-Guided Model Inversion Attack for Distribution Shift arXiv 2024 Link
Bridging Privacy and Robustness for Trustworthy Machine Learning arXiv 2024 Link
Budget Recycling Differential Privacy arXiv 2024 Link
Building Gradient Bridges: Label Leakage from Restricted Gradient Sharing in Federated Learning arXiv 2024 Link
CFVNet: An End-to-End Cancelable Finger Vein Network for Recognition arXiv 2024 Link
CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion arXiv 2024 Link
CIF-Bench: A Chinese Instruction-Following Benchmark for Evaluating the Generalizability of Large Language Models arXiv 2024 Link
CREF: An LLM-based Conversational Software Repair Framework for Programming Tutors arXiv 2024 Link
CURATE: Scaling-up Differentially Private Causal Graph Discovery arXiv 2024 Link
Can Graph Neural Networks Expose Training Data Properties? An Efficient Risk Assessment Approach arXiv 2024 Link
Can LLMs Learn New Concepts Incrementally without Forgetting? arXiv 2024 Link
Can LLMs get help from other LLMs without revealing private information? arXiv 2024 Link
Can Large Language Models Automatically Jailbreak GPT-4V? arXiv 2024 Link
Can Quantum Computers Do Nothing? arXiv 2024 Link
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM arXiv 2024 Link
CausalVE: Face Video Privacy Encryption via Causal Video Prediction arXiv 2024 Link
Chaos in Motion: Unveiling Robustness in Remote Heart Rate Measurement through Brain-Inspired Skin Tracking arXiv 2024 Link
Clients Collaborate: Flexible Differentially Private Federated Learning with Guaranteed Improvement of Utility-Privacy Trade-off arXiv 2024 Link
ClinicalLab: Aligning Agents for Multi-Departmental Clinical Diagnostics in the Real World arXiv 2024 Link
Cluster-Enhanced Federated Graph Neural Network for Recommendation arXiv 2024 Link
Cobblestone: A Divide-and-Conquer Approach for Automating Formal Verification arXiv 2024 Link
Codev-Bench: How Do LLMs Understand Developer-Centric Code Completion? arXiv 2024 Link
Collaborative Automatic Modulation Classification via Deep Edge Inference for Hierarchical Cognitive Radio Networks arXiv 2024 Link
Communication-robust and Privacy-safe Distributed Estimation for Heterogeneous Community-level Behind-the-meter Solar Power Generation arXiv 2024 Link
ComplexCodeEval: A Benchmark for Evaluating Large Code Models on More Complex Code arXiv 2024 Link
Condensed Data Expansion Using Model Inversion for Knowledge Distillation arXiv 2024 Link
Considerate Ramp Secret Sharing arXiv 2024 Link
Consistent Update Synthesis via Privatized Beliefs arXiv 2024 Link
Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data arXiv 2024 Link
Contrastive Graph Condensation: Advancing Data Versatility through Self-Supervised Learning arXiv 2024 Link
Convergent Differential Privacy Analysis for General Federated Learning: the $f$-DP Perspective arXiv 2024 Link
Correctness Verification of Neural Networks Approximating Differential Equations arXiv 2024 Link
Curator Attack: When Blackbox Differential Privacy Auditing Loses Its Power arXiv 2024 Link
DAFT-GAN: Dual Affine Transformation Generative Adversarial Network for Text-Guided Image Inpainting arXiv 2024 Link
DAGER: Exact Gradient Inversion for Large Language Models arXiv 2024 Link
DATransNet: Dynamic Attention Transformer Network for Infrared Small Target Detection arXiv 2024 Link
DEFAME: Dynamic Evidence-based FAct-checking with Multimodal Experts arXiv 2024 Link
DESIRE: Dynamic Knowledge Consolidation for Rehearsal-Free Continual Learning arXiv 2024 Link
DM4Steal: Diffusion Model For Link Stealing Attack On Graph Neural Networks arXiv 2024 Link
DR-Encoder: Encode Low-rank Gradients with Random Prior for Large Language Models Differentially Privately arXiv 2024 Link
DRL-Based Resource Allocation for Motion Blur Resistant Federated Self-Supervised Learning in IoV arXiv 2024 Link
Data Lineage Inference: Uncovering Privacy Vulnerabilities of Dataset Pruning arXiv 2024 Link
Data Reconstruction Attacks and Defenses: A Systematic Evaluation arXiv 2024 Link
Dataset Condensation Driven Machine Unlearning arXiv 2024 Link
Dataset Size Recovery from LoRA Weights arXiv 2024 Link
DeMem: Privacy-Enhanced Robust Adversarial Learning via De-Memorization arXiv 2024 Link
Dealing Doubt: Unveiling Threat Models in Gradient Inversion Attacks under Federated Learning, A Survey and Taxonomy arXiv 2024 Link
DebugBench: Evaluating Debugging Capability of Large Language Models arXiv 2024 Link
Decaf: Data Distribution Decompose Attack against Federated Learning arXiv 2024 Link
Decentralised, Collaborative, and Privacy-preserving Machine Learning for Multi-Hospital Data arXiv 2024 Link
Decentralized Collaborative Learning Framework with External Privacy Leakage Analysis arXiv 2024 Link
Decentralized Federated Anomaly Detection in Smart Grids: A P2P Gossip Approach arXiv 2024 Link
Decentralized Nonconvex Robust Optimization over Unsafe Multiagent Systems: System Modeling, Utility, Resilience, and Privacy Analysis arXiv 2024 Link
Decentralized Proactive Model Offloading and Resource Allocation for Split and Federated Learning arXiv 2024 Link
Decoding Secret Memorization in Code LLMs Through Token-Level Characterization arXiv 2024 Link
Decoupled Federated Learning on Long-Tailed and Non-IID data with Feature Statistics arXiv 2024 Link
Deep Joint Source Channel Coding for Privacy-Aware End-to-End Image Transmission arXiv 2024 Link
Deep Learning Model Security: Threats and Defenses arXiv 2024 Link
Deep Privacy Funnel Model: From a Discriminative to a Generative Approach with an Application to Face Recognition arXiv 2024 Link
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach arXiv 2024 Link
Defending Against Neural Network Model Inversion Attacks via Data Poisoning arXiv 2024 Link
Defending Membership Inference Attacks via Privacy-aware Sparsity Tuning arXiv 2024 Link
Defending against Data Poisoning Attacks in Federated Learning via User Elimination arXiv 2024 Link
Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement arXiv 2024 Link
Detachment Problem -- Application in Prevention of Information Leakage in Stock Markets arXiv 2024 Link
Detecting and Understanding the Promotion of Illicit Goods and Services on Twitter arXiv 2024 Link
Developer Perspectives on Licensing and Copyright Issues Arising from Generative AI for Software Development arXiv 2024 Link
Development and Validation of a Large Language Model for Generating Fully-Structured Radiology Reports arXiv 2024 Link
Differential Privacy Preserving Distributed Quantum Computing arXiv 2024 Link
Differential Privacy in Continual Learning: Which Labels to Update? arXiv 2024 Link
Differential privacy enables fair and accurate AI-based analysis of speech disorders while protecting patient data arXiv 2024 Link
Differentially Private Distributed Inference arXiv 2024 Link
Differentially Private Distributed Nonconvex Stochastic Optimization with Quantized Communication arXiv 2024 Link
Differentially Private Estimation of Weighted Average Treatment Effects for Binary Outcomes arXiv 2024 Link
Differentially Private Federated Learning without Noise Addition: When is it Possible? arXiv 2024 Link
Differentially Private Graph Diffusion with Applications in Personalized PageRanks arXiv 2024 Link
Differentially Private Spatiotemporal Trajectory Synthesis with Retained Data Utility arXiv 2024 Link
Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks arXiv 2024 Link
Distinctive and Natural Speaker Anonymization via Singular Value Transformation-assisted Matrix arXiv 2024 Link
Distributed Swarm Learning for Edge Internet of Things arXiv 2024 Link
Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning arXiv 2024 Link
Don't Push the Button! Exploring Data Leakage Risks in Machine Learning and Transfer Learning arXiv 2024 Link
Driving Privacy Forward: Mitigating Information Leakage within Smart Vehicles through Synthetic Data Generation arXiv 2024 Link
Dullahan: Stealthy Backdoor Attack against Without-Label-Sharing Split Learning arXiv 2024 Link
Dysca: A Dynamic and Scalable Benchmark for Evaluating Perception Ability of LVLMs arXiv 2024 Link
E2ED^2:Direct Mapping from Noise to Data for Enhanced Diffusion Models arXiv 2024 Link
EIA: Environmental Injection Attack on Generalist Web Agents for Privacy Leakage arXiv 2024 Link
EM-MIAs: Enhancing Membership Inference Attacks in Large Language Models through Ensemble Modeling arXiv 2024 Link
EMIT: Micro-Invasive Database Configuration Tuning arXiv 2024 Link
EarthquakeNPP: A Benchmark for Earthquake Forecasting with Neural Point Processes arXiv 2024 Link
Eavesdropping on Goal-Oriented Communication: Timing Attacks and Countermeasures arXiv 2024 Link
Edge Learning Based Collaborative Automatic Modulation Classification for Hierarchical Cognitive Radio Networks arXiv 2024 Link
EdgeLeakage: Membership Information Leakage in Distributed Edge Intelligence Systems arXiv 2024 Link
Edinburgh Clinical NLP at SemEval-2024 Task 2: Fine-tune your model unless you have access to GPT-4 arXiv 2024 Link
Efficient Brain Imaging Analysis for Alzheimer's and Dementia Detection Using Convolution-Derivative Operations arXiv 2024 Link
Efficient Privacy-Preserving KAN Inference Using Homomorphic Encryption arXiv 2024 Link
Efficient and Personalized Mobile Health Event Prediction via Small Language Models arXiv 2024 Link
Efficient and Private: Memorisation under differentially private parameter-efficient fine-tuning in language models arXiv 2024 Link
Efficiently Assemble Normalization Layers and Regularization for Federated Domain Generalization arXiv 2024 Link
Eguard: Defending LLM Embeddings Against Inversion Attacks via Text Mutual Information Optimization arXiv 2024 Link
Eliminating Information Leakage in Hard Concept Bottleneck Models with Supervised, Hierarchical Concept Learning arXiv 2024 Link
EnIGMA: Interactive Tools Substantially Assist LM Agents in Finding Security Vulnerabilities arXiv 2024 Link
Enhancing Data Privacy in Large Language Models through Private Association Editing arXiv 2024 Link
Enhancing Data Quality through Simple De-duplication: Navigating Responsible Computational Social Science Research arXiv 2024 Link
Enhancing Federated Learning with Adaptive Differential Privacy and Priority-Based Aggregation arXiv 2024 Link
Enhancing Graph Self-Supervised Learning with Graph Interplay arXiv 2024 Link
Enhancing Privacy in Face Analytics Using Fully Homomorphic Encryption arXiv 2024 Link
Enhancing Privacy in Federated Learning through Quantum Teleportation Integration arXiv 2024 Link
Enhancing Privacy of Spatiotemporal Federated Learning against Gradient Inversion Attacks arXiv 2024 Link
Enhancing Security Using Random Binary Weights in Privacy-Preserving Federated Learning arXiv 2024 Link
Ensembler: Protect Collaborative Inference Privacy from Model Inversion Attack via Selective Ensemble arXiv 2024 Link
Estimating Privacy Leakage of Augmented Contextual Knowledge in Language Models arXiv 2024 Link
Ethos: Rectifying Language Models in Orthogonal Parameter Space arXiv 2024 Link
Evaluating Language Model Agency through Negotiations arXiv 2024 Link
Evaluations of Machine Learning Privacy Defenses are Misleading arXiv 2024 Link
EventSum: A Large-Scale Event-Centric Summarization Dataset for Chinese Multi-News Documents arXiv 2024 Link
EvoCodeBench: An Evolving Code Generation Benchmark Aligned with Real-World Code Repositories arXiv 2024 Link
EvoCodeBench: An Evolving Code Generation Benchmark with Domain-Specific Evaluations arXiv 2024 Link
Expiring opacity problems in parametric timed automata arXiv 2024 Link
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite arXiv 2024 Link
Exploiting the Lock: Leveraging MiG-V's Logic Locking for Secret-Data Extraction arXiv 2024 Link
Exploring User-level Gradient Inversion with a Diffusion Prior arXiv 2024 Link
Exploring the Uncoordinated Privacy Protections of Eye Tracking and VR Motion Data for Unauthorized User Identification arXiv 2024 Link
Extracting Prompts by Inverting LLM Outputs arXiv 2024 Link
Extracting Spatiotemporal Data from Gradients with Large Language Models arXiv 2024 Link
Extracting Training Data from Unconditional Diffusion Models arXiv 2024 Link
F-Fidelity: A Robust Framework for Faithfulness Evaluation of Explainable AI arXiv 2024 Link
FEDLAD: Federated Evaluation of Deep Leakage Attacks and Defenses arXiv 2024 Link
FGAD: Self-boosted Knowledge Distillation for An Effective Federated Graph Anomaly Detection Framework arXiv 2024 Link
FL-DABE-BC: A Privacy-Enhanced, Decentralized Authentication, and Secure Communication for Federated Learning Framework with Decentralized Attribute-Based Encryption and Blockchain for IoT Scenarios arXiv 2024 Link
Facebook Report on Privacy of fNIRS data arXiv 2024 Link
Fast Partition-Based Cross-Validation With Centering and Scaling for $\mathbf{X}^\mathbf{T}\mathbf{X}$ and $\mathbf{X}^\mathbf{T}\mathbf{Y}$ arXiv 2024 Link
Fault-tolerant and secure long-distance quantum communication via uncorrectable-error-injection arXiv 2024 Link
Feature-based Federated Transfer Learning: Communication Efficiency, Robustness and Privacy arXiv 2024 Link
FedAdOb: Privacy-Preserving Federated Deep Learning with Adaptive Obfuscation arXiv 2024 Link
FedCross: Intertemporal Federated Learning Under Evolutionary Games arXiv 2024 Link
FedDP: Privacy-preserving method based on federated learning for histopathology image segmentation arXiv 2024 Link
FedDTPT: Federated Discrete and Transferable Prompt Tuning for Black-Box Large Language Models arXiv 2024 Link
FedEval-LLM: Federated Evaluation of Large Language Models on Downstream Tasks with Collective Wisdom arXiv 2024 Link
FedGIG: Graph Inversion from Gradient in Federated Learning arXiv 2024 Link
FedHide: Federated Learning by Hiding in the Neighbors arXiv 2024 Link
FedSC: Provable Federated Self-supervised Learning with Spectral Contrastive Objective over Non-i.i.d. Data arXiv 2024 Link
Federated Anomaly Detection for Early-Stage Diagnosis of Autism Spectrum Disorders using Serious Game Data arXiv 2024 Link
Federated Cubic Regularized Newton Learning with Sparsification-amplified Differential Privacy arXiv 2024 Link
Federated Domain Generalization via Prompt Learning and Aggregation arXiv 2024 Link
Federated In-Context LLM Agent Learning arXiv 2024 Link
Federated Learning Nodes Can Reconstruct Peers' Image Data arXiv 2024 Link
Federated Learning and Evolutionary Game Model for Fog Federation Formation arXiv 2024 Link
Federated Learning for Data Market: Shapley-UCB for Seller Selection and Incentives arXiv 2024 Link
Federated Learning under Attack: Improving Gradient Inversion for Batch of Images arXiv 2024 Link
Federated Unlearning with Gradient Descent and Conflict Mitigation arXiv 2024 Link
Federated User Preference Modeling for Privacy-Preserving Cross-Domain Recommendation arXiv 2024 Link
FhGenie: A Custom, Confidentiality-preserving Chat AI for Corporate and Scientific Use arXiv 2024 Link
Fine-Tuning, Quantization, and LLMs: Navigating Unintended Outcomes arXiv 2024 Link
Fluent: Round-efficient Secure Aggregation for Private Federated Learning arXiv 2024 Link
ForecastBench: A Dynamic Benchmark of AI Forecasting Capabilities arXiv 2024 Link
Forget to Flourish: Leveraging Machine-Unlearning on Pretrained Language Models for Privacy Leakage arXiv 2024 Link
Formal Verification of Digital Twins with TLA and Information Leakage Control arXiv 2024 Link
From Epilepsy Seizures Classification to Detection: A Deep Learning-based Approach for Raw EEG Signals arXiv 2024 Link
From Mean to Extreme: Formal Differential Privacy Bounds on the Success of Real-World Data Reconstruction Attacks arXiv 2024 Link
GAMformer: Bridging Tabular Foundation Models and Interpretable Machine Learning arXiv 2024 Link
GAOKAO-Eval: Does high scores truly reflect strong capabilities in LLMs? arXiv 2024 Link
GI-NAS: Boosting Gradient Inversion Attacks Through Adaptive Neural Architecture Search arXiv 2024 Link
GI-PIP: Do We Require Impractical Auxiliary Dataset for Gradient Inversion Attacks? arXiv 2024 Link
GI-SMN: Gradient Inversion Attack against Federated Learning without Prior Knowledge arXiv 2024 Link
Game-Theoretic Machine Unlearning: Mitigating Extra Privacy Leakage arXiv 2024 Link
Gaussian Ensemble Belief Propagation for Efficient Inference in High-Dimensional Systems arXiv 2024 Link
GeFL: Model-Agnostic Federated Learning with Generative Models arXiv 2024 Link
Geminio: Language-Guided Gradient Inversion Attacks in Federated Learning arXiv 2024 Link
Generative AI for Secure and Privacy-Preserving Mobile Crowdsensing arXiv 2024 Link
Gibberish is All You Need for Membership Inference Detection in Contrastive Language-Audio Pretraining arXiv 2024 Link
Goal oriented optimal design of infinite-dimensional Bayesian inverse problems using quadratic approximations arXiv 2024 Link
Gradient Inversion Attack on Graph Neural Networks arXiv 2024 Link
Gradient Inversion of Federated Diffusion Models arXiv 2024 Link
GraphTheft: Quantifying Privacy Risks in Graph Prompt Learning arXiv 2024 Link
Guaranteeing Data Privacy in Federated Unlearning with Dynamic User Participation arXiv 2024 Link
HARE: HumAn pRiors, a key to small language model Efficiency arXiv 2024 Link
HARMONIC: Harnessing LLMs for Tabular Data Synthesis and Privacy Protection arXiv 2024 Link
Heterogeneous Federated Learning with Splited Language Model arXiv 2024 Link
HiddenSpeaker: Generate Imperceptible Unlearnable Audios for Speaker Verification System arXiv 2024 Link
High Epsilon Synthetic Data Vulnerabilities in MST and PrivBayes arXiv 2024 Link
Hotfixing Large Language Models for Code arXiv 2024 Link
How Do Your Code LLMs Perform? Empowering Code Instruction Tuning with High-Quality Data arXiv 2024 Link
How Reliable is Your Simulator? Analysis on the Limitations of Current LLM-based User Simulators for Conversational Recommendation arXiv 2024 Link
How to Privately Tune Hyperparameters in Federated Learning? Insights from a Benchmark Study arXiv 2024 Link
Hyperparameter Optimization for SecureBoost via Constrained Multi-Objective Federated Learning arXiv 2024 Link
IDEA: A Flexible Framework of Certified Unlearning for Graph Neural Networks arXiv 2024 Link
If you can describe it, they can see it: Cross-Modal Learning of Visual Concepts from Textual Descriptions arXiv 2024 Link
Imitation Learning for Adaptive Video Streaming with Future Adversarial Information Bottleneck Principle arXiv 2024 Link
Immersion and Invariance-based Coding for Privacy-Preserving Federated Learning arXiv 2024 Link
Impact of Leakage on Data Harmonization in Machine Learning Pipelines in Class Imbalance Across Sites arXiv 2024 Link
Impact of Sampling Techniques and Data Leakage on XGBoost Performance in Credit Card Fraud Detection arXiv 2024 Link
Importance of Disjoint Sampling in Conventional and Transformer Models for Hyperspectral Image Classification arXiv 2024 Link
Improving Image Data Leakage Detection in Automotive Software arXiv 2024 Link
Improving Robustness to Model Inversion Attacks via Sparse Coding Architectures arXiv 2024 Link
Improving the Transferability of Adversarial Examples by Feature Augmentation arXiv 2024 Link
IncogniText: Privacy-enhancing Conditional Text Anonymization via LLM-based Private Attribute Randomization arXiv 2024 Link
Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks arXiv 2024 Link
Inference Attacks Against Face Recognition Model without Classification Layers arXiv 2024 Link
Inferentially-Private Private Information arXiv 2024 Link
Information Density Bounds for Privacy arXiv 2024 Link
Information Leakage Detection through Approximate Bayes-optimal Prediction arXiv 2024 Link
Information Leakage from Embedding in Large Language Models arXiv 2024 Link
Information Leakage through Physical Layer Supply Voltage Coupling Vulnerability arXiv 2024 Link
InjecGuard: Benchmarking and Mitigating Over-defense in Prompt Injection Guardrail Models arXiv 2024 Link
Inside the Black Box: Detecting Data Leakage in Pre-trained Language Encoders arXiv 2024 Link
Insights and Current Gaps in Open-Source LLM Vulnerability Scanners: A Comparative Analysis arXiv 2024 Link
Interactive Visual Assessment for Text-to-Image Generation Models arXiv 2024 Link
Inverse-Q*: Token Level Reinforcement Learning for Aligning Large Language Models Without Preference Data arXiv 2024 Link
Inverting Gradient Attacks Makes Powerful Data Poisoning arXiv 2024 Link
Investigating Privacy Leakage in Dimensionality Reduction Methods via Reconstruction Attack arXiv 2024 Link
Investigating the Quality of DermaMNIST and Fitzpatrick17k Dermatological Image Datasets arXiv 2024 Link
Is Diffusion Model Safe? Severe Data Leakage via Gradient-Guided Diffusion Model arXiv 2024 Link
Is Your LLM Outdated? A Deep Look at Temporal Generalization arXiv 2024 Link
It's Our Loss: No Privacy Amplification for Hidden State DP-SGD With Non-Convex Loss arXiv 2024 Link
IterGen: Iterative Semantic-aware Structured LLM Generation with Backtracking arXiv 2024 Link
KnFu: Effective Knowledge Fusion arXiv 2024 Link
Knowledge Distillation-Based Model Extraction Attack using GAN-based Private Counterfactual Explanations arXiv 2024 Link
KnowledgeSG: Privacy-Preserving Synthetic Text Generation with Knowledge Distillation from Server arXiv 2024 Link
LDPKiT: Superimposing Remote Queries for Privacy-Preserving Local Model Training arXiv 2024 Link
LEAP: Optimization Hierarchical Federated Learning on Non-IID Data with Coalition Formation Game arXiv 2024 Link
LLM-PBE: Assessing Data Privacy in Large Language Models arXiv 2024 Link
LLMArena: Assessing Capabilities of Large Language Models in Dynamic Multi-Agent Environments arXiv 2024 Link
LLMJudge: LLMs for Relevance Judgments arXiv 2024 Link
LabObf: A Label Protection Scheme for Vertical Federated Learning Through Label Obfuscation arXiv 2024 Link
Lancelot: Towards Efficient and Privacy-Preserving Byzantine-Robust Federated Learning within Fully Homomorphic Encryption arXiv 2024 Link
Language-Queried Target Sound Extraction Without Parallel Training Data arXiv 2024 Link
Large Language Models are Easily Confused: A Quantitative Metric, Security Implications and Typological Analysis arXiv 2024 Link
Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols arXiv 2024 Link
Large-scale, Independent and Comprehensive study of the power of LLMs for test case generation arXiv 2024 Link
Larimar: Large Language Models with Episodic Memory Control arXiv 2024 Link
Leak and Learn: An Attacker's Cookbook to Train Using Leaked Data from Federated Learning arXiv 2024 Link
LeakAgent: RL-based Red-teaming Agent for LLM Privacy Leakage arXiv 2024 Link
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning arXiv 2024 Link
Learning Privacy-Preserving Student Networks via Discriminative-Generative Distillation arXiv 2024 Link
Learning Robust and Privacy-Preserving Representations via Information Theory arXiv 2024 Link
Leveraging A New GAN-based Transformer with ECDH Crypto-system for Enhancing Energy Theft Detection in Smart Grid arXiv 2024 Link
Leveraging Model Guidance to Extract Training Data from Personalized Diffusion Models arXiv 2024 Link
Leveraging Programmatically Generated Synthetic Data for Differentially Private Diffusion Training arXiv 2024 Link
Long Story Short: Story-level Video Understanding from 20K Short Films arXiv 2024 Link
Look into the Future: Deep Contextualized Sequential Recommendation arXiv 2024 Link
Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection arXiv 2024 Link
Lost in the Averages: A New Specific Setup to Evaluate Membership Inference Attacks Against Machine Learning Models arXiv 2024 Link
MAPPING: Debiasing Graph Neural Networks for Fair Node Classification with Limited Sensitive Information Leakage arXiv 2024 Link
MERA: A Comprehensive LLM Evaluation in Russian arXiv 2024 Link
MGIC: A Multi-Label Gradient Inversion Attack based on Canny Edge Detection on Federated Learning arXiv 2024 Link
MIBench: A Comprehensive Framework for Benchmarking Model Inversion Attack and Defense arXiv 2024 Link
MLLM-LLaVA-FL: Multimodal Large Language Model Assisted Federated Learning arXiv 2024 Link
MLLMGuard: A Multi-dimensional Safety Evaluation Suite for Multimodal Large Language Models arXiv 2024 Link
MMLU-CF: A Contamination-free Multi-task Language Understanding Benchmark arXiv 2024 Link
MT-Eval: A Multi-Turn Capabilities Evaluation Benchmark for Large Language Models arXiv 2024 Link
MUSE: Machine Unlearning Six-Way Evaluation for Language Models arXiv 2024 Link
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning arXiv 2024 Link
Mapping The Layers of The Ocean Floor With a Convolutional Neural Network arXiv 2024 Link
Maximal Guesswork Leakage arXiv 2024 Link
Measuring Quantum Information Leakage Under Detection Threat arXiv 2024 Link
MedLeak: Multimodal Medical Data Leakage in Secure Federated Learning with Crafted Models arXiv 2024 Link
Meeting Utility Constraints in Differential Privacy: A Privacy-Boosting Approach arXiv 2024 Link
Membership Inference Attacks Against In-Context Learning arXiv 2024 Link
Membership Inference on Text-to-Image Diffusion Models via Conditional Likelihood Discrepancy arXiv 2024 Link
Membership Information Leakage in Federated Contrastive Learning arXiv 2024 Link
Mitigating Prior Shape Bias in Point Clouds via Differentiable Center Learning arXiv 2024 Link
Model Inversion Attacks Through Target-Specific Conditional Diffusion Models arXiv 2024 Link
Model Inversion Attacks: A Survey of Approaches and Countermeasures arXiv 2024 Link
Modular Neural Wiretap Codes for Fading Channels arXiv 2024 Link
Multi-PA: A Multi-perspective Benchmark on Privacy Assessment for Large Vision-Language Models arXiv 2024 Link
Multi-channel polarization manipulation based on graphene for encryption communication arXiv 2024 Link
Multi-speaker Text-to-speech Training with Speaker Anonymized Data arXiv 2024 Link
Mutual information chain rules for security proofs robust against device imperfections arXiv 2024 Link
NR-V2X Quality of Service Prediction Through Machine Learning with Nested Cross-Validation Scheme arXiv 2024 Link
NYT-Connections: A Deceptively Simple Text Classification Task that Stumps System-1 Thinkers arXiv 2024 Link
Nebula: Efficient, Private and Accurate Histogram Estimation arXiv 2024 Link
NetBench: A Large-Scale and Comprehensive Network Traffic Benchmark Dataset for Foundation Models arXiv 2024 Link
NetDPSyn: Synthesizing Network Traces under Differential Privacy arXiv 2024 Link
Network-Aware Value Stacking of Community Battery via Asynchronous Distributed Optimization arXiv 2024 Link
Neural Embedded Mixed-Integer Optimization for Location-Routing Problems arXiv 2024 Link
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports arXiv 2024 Link
No Free Lunch Theorem for Privacy-Preserving LLM Inference arXiv 2024 Link
Noise Masking Attacks and Defenses for Pretrained Speech Models arXiv 2024 Link
Obfuscation Based Privacy Preserving Representations are Recoverable Using Neighborhood Information arXiv 2024 Link
OlympicArena: Benchmarking Multi-discipline Cognitive Reasoning for Superintelligent AI arXiv 2024 Link
On Active Privacy Auditing in Supervised Fine-tuning for White-Box Language Models arXiv 2024 Link
On Catastrophic Inheritance of Large Foundation Models arXiv 2024 Link
On Class Separability Pitfalls In Audio-Text Contrastive Zero-Shot Learning arXiv 2024 Link
On Epistemic Properties in Discrete-Event Systems: A Uniform Framework and Its Applications arXiv 2024 Link
On Inter-dataset Code Duplication and Data Leakage in Large Language Models arXiv 2024 Link
On Leakage of Code Generation Evaluation Datasets arXiv 2024 Link
On Protecting the Data Privacy of Large Language Models (LLMs): A Survey arXiv 2024 Link
On the (Mis)Use of Machine Learning with Panel Data arXiv 2024 Link
On the Information Leakage Performance of Secure Finite Blocklength Transmissions over Rayleigh Fading Channels arXiv 2024 Link
On the Vulnerability of Skip Connections to Model Inversion Attacks arXiv 2024 Link
Open Ko-LLM Leaderboard: Evaluating Large Language Models in Korean with Ko-H5 Benchmark arXiv 2024 Link
Optimal Defenses Against Gradient Reconstruction Attacks arXiv 2024 Link
Optimal Privacy-Aware Stochastic Sampling arXiv 2024 Link
Optimizing Age of Information in Vehicular Edge Computing with Federated Graph Neural Network Multi-Agent Reinforcement Learning arXiv 2024 Link
Order Matters! An Empirical Study on Large Language Models' Input Order Bias in Software Fault Localization arXiv 2024 Link
Orthogonal-state-based Measurement Device Independent Quantum Communication arXiv 2024 Link
PANORAMIA: Privacy Auditing of Machine Learning Models without Retraining arXiv 2024 Link
PAPILLON: Privacy Preservation from Internet-based and Local Language Model Ensembles arXiv 2024 Link
PATE-TripleGAN: Privacy-Preserving Image Synthesis with Gaussian Differential Privacy arXiv 2024 Link
PILA: Physics-Informed Low Rank Augmentation for Interpretable Earth Observation arXiv 2024 Link
PRSI: Privacy-Preserving Recommendation Model Based on Vector Splitting and Interactive Protocols arXiv 2024 Link
PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models arXiv 2024 Link
PateGail: A Privacy-Preserving Mobility Trajectory Generator with Imitation Learning arXiv 2024 Link
Peer2PIR: Private Queries for IPFS arXiv 2024 Link
Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal Tools arXiv 2024 Link
Perfect Gradient Inversion in Federated Learning: A New Paradigm from the Hidden Subset Sum Problem arXiv 2024 Link
Perfect Subset Privacy in Polynomial Computation via Reed-Muller Information Super-sets arXiv 2024 Link
PianoBART: Symbolic Piano Music Generation and Understanding with Large-Scale Pre-Training arXiv 2024 Link
PixelFade: Privacy-preserving Person Re-identification with Noise-guided Progressive Replacement arXiv 2024 Link
Position: Towards Implicit Prompt For Text-To-Image Models arXiv 2024 Link
Pre-Training Protein Bi-level Representation Through Span Mask Strategy On 3D Protein Chains arXiv 2024 Link
Prediction Exposes Your Face: Black-box Model Inversion via Prediction Alignment arXiv 2024 Link
Preventing Non-intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters arXiv 2024 Link
Preventive Audits for Data Applications Before Data Sharing in the Power IoT arXiv 2024 Link
PriRoAgg: Achieving Robust Model Aggregation with Minimum Privacy Leakage for Federated Learning arXiv 2024 Link
PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud arXiv 2024 Link
Privacy Amplification for the Gaussian Mechanism via Bounded Support arXiv 2024 Link
Privacy Attack in Federated Learning is Not Easy: An Experimental Study arXiv 2024 Link
Privacy Aware Memory Forensics arXiv 2024 Link
Privacy Challenges in Meta-Learning: An Investigation on Model-Agnostic Meta-Learning arXiv 2024 Link
Privacy Leakage Overshadowed by Views of AI: A Study on Human Oversight of Privacy in Language Model Agent arXiv 2024 Link
Privacy Leakage on DNNs: A Survey of Model Inversion Attacks and Defenses arXiv 2024 Link
Privacy Preserving Semi-Decentralized Mean Estimation over Intermittently-Connected Networks arXiv 2024 Link
Privacy in Federated Learning arXiv 2024 Link
Privacy-Aware Design of Distributed MIMO ISAC Systems arXiv 2024 Link
Privacy-Aware Multi-Device Cooperative Edge Inference with Distributed Resource Bidding arXiv 2024 Link
Privacy-Preserving Collaborative Split Learning Framework for Smart Grid Load Forecasting arXiv 2024 Link
Privacy-Preserving Federated Learning with Consistency via Knowledge Distillation Using Conditional Generator arXiv 2024 Link
Privacy-Preserving Federated Learning with Differentially Private Hyperdimensional Computing arXiv 2024 Link
Privacy-Preserving Federated Unlearning with Certified Client Removal arXiv 2024 Link
Privacy-Preserving Heterogeneous Federated Learning for Sensitive Healthcare Data arXiv 2024 Link
Privacy-Preserving Large Language Models: Mechanisms, Applications, and Future Directions arXiv 2024 Link
Privacy-Preserving Low-Rank Adaptation against Membership Inference Attacks for Latent Diffusion Models arXiv 2024 Link
Privacy-Preserving Student Learning with Differentially Private Data-Free Distillation arXiv 2024 Link
Privacy-Preserving Video Anomaly Detection: A Survey arXiv 2024 Link
Privacy-Utility Tradeoff Based on $α$-lift arXiv 2024 Link
PrivacyLens: Evaluating Privacy Norm Awareness of Language Models in Action arXiv 2024 Link
PrivatEyes: Appearance-based Gaze Estimation Using Federated Secure Multi-Party Computation arXiv 2024 Link
Private Data Leakage in Federated Human Activity Recognition for Wearable Healthcare Devices arXiv 2024 Link
Private Language Models via Truncated Laplacian Mechanism arXiv 2024 Link
Private and Communication-Efficient Federated Learning based on Differentially Private Sketches arXiv 2024 Link
Private, Augmentation-Robust and Task-Agnostic Data Valuation Approach for Data Marketplace arXiv 2024 Link
Promise and Peril of Collaborative Code Generation Models: Balancing Effectiveness and Memorization arXiv 2024 Link
Prompt-based Unifying Inference Attack on Graph Neural Networks arXiv 2024 Link
Propelling Innovation to Defeat Data-Leakage Hardware Trojans: From Theory to Practice arXiv 2024 Link
Protect Your Secrets: Understanding and Measuring Data Exposure in VSCode Extensions arXiv 2024 Link
Protect and Extend -- Using GANs for Synthetic Data Generation of Time-Series Medical Records arXiv 2024 Link
Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation arXiv 2024 Link
Prototypical Distillation and Debiased Tuning for Black-box Unsupervised Domain Adaptation arXiv 2024 Link
Provable Privacy Advantages of Decentralized Federated Learning via Distributed Optimization arXiv 2024 Link
Providing Differential Privacy for Federated Learning Over Wireless: A Cross-layer Framework arXiv 2024 Link
Psychometrics for Hypnopaedia-Aware Machinery via Chaotic Projection of Artificial Mental Imagery arXiv 2024 Link
QI-DPFL: Quality-Aware and Incentive-Boosted Federated Learning with Differential Privacy arXiv 2024 Link
QTFlow: Quantitative Timing-Sensitive Information Flow for Security-Aware Hardware Design on RTL arXiv 2024 Link
QuanCrypt-FL: Quantized Homomorphic Encryption with Pruning for Secure Federated Learning arXiv 2024 Link
Quantifying Privacy via Information Density arXiv 2024 Link
Quantum Scheme for Private Set Intersection and Union Cardinality based on Quantum Homomorphic Encryption arXiv 2024 Link
Quantum key distribution with imperfectly isolated devices arXiv 2024 Link
Quantum-secure multiparty deep learning arXiv 2024 Link
R-CONV: An Analytical Approach for Efficient Data Reconstruction via Convolutional Gradients arXiv 2024 Link
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM arXiv 2024 Link
RFLPA: A Robust Federated Learning Framework against Poisoning Attacks with Secure Aggregation arXiv 2024 Link
RSET: Remapping-based Sorting Method for Emotion Transfer Speech Synthesis arXiv 2024 Link
RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations arXiv 2024 Link
Random Erasing vs. Model Inversion: A Promising Defense or a False Hope? arXiv 2024 Link
Rank Matters: Understanding and Defending Model Inversion Attacks via Low-Rank Feature Filtering arXiv 2024 Link
Re-Evaluating Privacy in Centralized and Decentralized Learning: An Information-Theoretical and Empirical Study arXiv 2024 Link
Real-Time Trajectory Synthesis with Local Differential Privacy arXiv 2024 Link
Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT Models arXiv 2024 Link
Reconstructing Training Data From Real World Models Trained with Transfer Learning arXiv 2024 Link
Reconstruction of Differentially Private Text Sanitization via Large Language Models arXiv 2024 Link
Recovering Labels from Local Updates in Federated Learning arXiv 2024 Link
Red-Teaming Segment Anything Model arXiv 2024 Link
Referee Can Play: An Alternative Approach to Conditional Generation via Model Inversion arXiv 2024 Link
Reflection-Bench: Evaluating Epistemic Agency in Large Language Models arXiv 2024 Link
Remote Estimation Games with Random Walk Processes: Stackelberg Equilibrium arXiv 2024 Link
RemoteRAG: A Privacy-Preserving LLM Cloud RAG Service arXiv 2024 Link
Representation Magnitude has a Liability to Privacy Vulnerability arXiv 2024 Link
Retrieval-Augmented Generation Meets Data-Driven Tabula Rasa Approach for Temporal Knowledge Graph Forecasting arXiv 2024 Link
Retrieval-Augmented Generation for AI-Generated Content: A Survey arXiv 2024 Link
Revealing data leakage in protein interaction benchmarks arXiv 2024 Link
Reverse Prompt Engineering arXiv 2024 Link
Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks arXiv 2024 Link
Revisiting Main Memory-Based Covert and Side Channel Attacks in the Context of Processing-in-Memory arXiv 2024 Link
Revisiting Privacy-Utility Trade-off for DP Training with Pre-existing Knowledge arXiv 2024 Link
Revisiting Unnaturalness for Automated Program Repair in the Era of Large Language Models arXiv 2024 Link
Risks When Sharing LoRA Fine-Tuned Diffusion Model Weights arXiv 2024 Link
RobustSVC: HuBERT-based Melody Extractor and Adversarial Learning for Robust Singing Voice Conversion arXiv 2024 Link
Robustness of Practical Perceptual Hashing Algorithms to Hash-Evasion and Hash-Inversion Attacks arXiv 2024 Link
SIDE: Surrogate Conditional Data Extraction from Diffusion Models arXiv 2024 Link
SPEAR:Exact Gradient Inversion of Batches in Federated Learning arXiv 2024 Link
SWE-Bench+: Enhanced Coding Benchmark for LLMs arXiv 2024 Link
SecGenAI: Enhancing Security of Cloud-based Generative AI Applications within Australian Critical Technologies of National Interest arXiv 2024 Link
Second-Order Information Matters: Revisiting Machine Unlearning for Large Language Models arXiv 2024 Link
Secure Distributed Storage: Optimal Trade-Off Between Storage Rate and Privacy Leakage arXiv 2024 Link
Secure Multiparty Generative AI arXiv 2024 Link
Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing arXiv 2024 Link
Secure Scattered Memory: Rethinking Secure Enclave Memory with Secret Sharing arXiv 2024 Link
Secure Source Coding Resilient Against Compromised Users via an Access Structure arXiv 2024 Link
Securing Biometric Data: Fully Homomorphic Encryption in Multimodal Iris and Face Recognition arXiv 2024 Link
Security of practical modulator-free quantum key distribution arXiv 2024 Link
SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries arXiv 2024 Link
Seeing the Forest through the Trees: Data Leakage from Partial Transformer Gradients arXiv 2024 Link
Segmented Private Data Aggregation in the Multi-message Shuffle Model arXiv 2024 Link
Self-Control of LLM Behaviors by Compressing Suffix Gradient into Prefix Controller arXiv 2024 Link
Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting arXiv 2024 Link
Self-Supervised Pretext Tasks for Alzheimer's Disease Classification using 3D Convolutional Neural Networks on Large-Scale Synthetic Neuroimaging Dataset arXiv 2024 Link
Semantic Alignment-Enhanced Code Translation via an LLM-Based Multi-Agent System arXiv 2024 Link
Separating common from salient patterns with Contrastive Representation Learning arXiv 2024 Link
Sequence-Level Leakage Risk of Training Data in Large Language Models arXiv 2024 Link
Sequential Disentanglement by Extracting Static Information From A Single Sequence Element arXiv 2024 Link
Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors arXiv 2024 Link
Shifted Interpolation for Differential Privacy arXiv 2024 Link
Silver Linings in the Shadows: Harnessing Membership Inference for Machine Unlearning arXiv 2024 Link
Simulation-based Inference of Developmental EEG Maturation with the Spectral Graph Model arXiv 2024 Link
Sketches-based join size estimation under local differential privacy arXiv 2024 Link
Smooth Sensitivity for Learning Differentially-Private yet Accurate Rule Lists arXiv 2024 Link
SoK: Membership Inference Attacks on LLMs are Rushing Nowhere (and How to Fix It) arXiv 2024 Link
SoK: On Gradient Leakage in Federated Learning arXiv 2024 Link
SoK: Reducing the Vulnerability of Fine-tuned Language Models to Membership Inference Attacks arXiv 2024 Link
Source-level reasoning for quantitative information flow arXiv 2024 Link
SpanSeq: Similarity-based sequence data splitting method for improved development and assessment of deep learning projects arXiv 2024 Link
Special Characters Attack: Toward Scalable Training Data Extraction From Large Language Models arXiv 2024 Link
Stable Inversion of Piecewise Affine Systems with Application to Feedforward and Iterative Learning Control arXiv 2024 Link
State-of-the-Art Approaches to Enhancing Privacy Preservation of Machine Learning Datasets: A Survey arXiv 2024 Link
Stealing Training Graphs from Graph Neural Networks arXiv 2024 Link
Strategic Learning and Trading in Broker-Mediated Markets arXiv 2024 Link
Structural Vulnerability in Y00 Protocols arXiv 2024 Link
Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning arXiv 2024 Link
SunBlock: Cloudless Protection for IoT Systems arXiv 2024 Link
Supervised machine learning for microbiomics: bridging the gap between current and best practices arXiv 2024 Link
TMGBench: A Systematic Game Benchmark for Evaluating Strategic Reasoning Abilities of LLMs arXiv 2024 Link
TabVFL: Improving Latent Representation in Vertical Federated Learning arXiv 2024 Link
TableGuard -- Securing Structured & Unstructured Data arXiv 2024 Link
Temperature-Aware Phase-shift Design of LC-RIS for Secure Communication arXiv 2024 Link
Test Oracle Automation in the era of LLMs arXiv 2024 Link
Test smells in LLM-Generated Unit Tests arXiv 2024 Link
Test-time generative augmentation for medical image segmentation arXiv 2024 Link
Text Embedding Inversion Security for Multilingual Language Models arXiv 2024 Link
The Asymptotic Behaviour of Information Leakage Metrics arXiv 2024 Link
The Curse of Popularity: Popular Entities have Catastrophic Side Effects when Deleting Knowledge from Language Models arXiv 2024 Link
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems arXiv 2024 Link
The Earth is Flat? Unveiling Factual Errors in Large Language Models arXiv 2024 Link
The Effect of Quantization in Federated Learning: A Rényi Differential Privacy Perspective arXiv 2024 Link
The Effects of Data Imbalance Under a Federated Learning Approach for Credit Risk Forecasting arXiv 2024 Link
The Fire Thief Is Also the Keeper: Balancing Usability and Privacy in Prompts arXiv 2024 Link
The Impact of Speech Anonymization on Pathology and Its Limits arXiv 2024 Link
The Impact of Train-Test Leakage on Machine Learning-based Android Malware Detection arXiv 2024 Link
The Last Iterate Advantage: Empirical Auditing and Principled Heuristic Analysis of Differentially Private SGD arXiv 2024 Link
The Limits of Differential Privacy in Online Learning arXiv 2024 Link
The Medium is the Message: How Secure Messaging Apps Leak Sensitive Data to Push Notification Services arXiv 2024 Link
The Mirrored Influence Hypothesis: Efficient Data Influence Estimation by Harnessing Forward Passes arXiv 2024 Link
The Phantom Menace: Unmasking Privacy Leakages in Vision-Language Models arXiv 2024 Link
The Queen of England is not England's Queen: On the Lack of Factual Coherency in PLMs arXiv 2024 Link
The Unlikely Duel: Evaluating Creative Writing in LLMs through a Unique Scenario arXiv 2024 Link
The impact of Facebook-Cambridge Analytica data scandal on the USA tech stock market: An event study based on clustering method arXiv 2024 Link
Theoretical Analysis of Privacy Leakage in Trustworthy Federated Learning: A Perspective from Linear Algebra and Optimization Theory arXiv 2024 Link
Threats, Attacks, and Defenses in Machine Unlearning: A Survey arXiv 2024 Link
Tiny models from tiny data: Textual and null-text inversion for few-shot distillation arXiv 2024 Link
TinyML Security: Exploring Vulnerabilities in Resource-Constrained Machine Learning Systems arXiv 2024 Link
To Shuffle or not to Shuffle: Auditing DP-SGD with Shuffling arXiv 2024 Link
ToMBench: Benchmarking Theory of Mind in Large Language Models arXiv 2024 Link
Top Leaderboard Ranking = Top Coding Proficiency, Always? EvoEval: Evolving Coding Benchmarks via LLM arXiv 2024 Link
Towards Eliminating Hard Label Constraints in Gradient Inversion Attacks arXiv 2024 Link
Towards Scalable and Robust Model Versioning arXiv 2024 Link
Towards identifying Source credibility on Information Leakage in Digital Gadget Market arXiv 2024 Link
Towards the Uncharted: Density-Descending Feature Perturbation for Semi-supervised Semantic Segmentation arXiv 2024 Link
Tracing Privacy Leakage of Language Models to Training Data via Adjusted Influence Functions arXiv 2024 Link
Training on Fake Labels: Mitigating Label Leakage in Split Learning via Secure Dimension Transformation arXiv 2024 Link
Training on the Benchmark Is Not All You Need arXiv 2024 Link
Training on the Test Task Confounds Evaluation and Emergence arXiv 2024 Link
Training-efficient density quantum machine learning arXiv 2024 Link
Trap-MID: Trapdoor-based Defense against Model Inversion Attacks arXiv 2024 Link
Tree-Based Leakage Inspection and Control in Concept Bottleneck Models arXiv 2024 Link
TreeEval: Benchmark-Free Evaluation of Large Language Models through Tree Planning arXiv 2024 Link
Trust and ethical considerations in a multi-modal, explainable AI-driven chatbot tutoring system: The case of collaboratively solving Rubik's Cube arXiv 2024 Link
TrustAI at SemEval-2024 Task 8: A Comprehensive Analysis of Multi-domain Machine Generated Text Detection Techniques arXiv 2024 Link
Trustworthiness of Stochastic Gradient Descent in Distributed Learning arXiv 2024 Link
Two-Way Aerial Secure Communications via Distributed Collaborative Beamforming under Eavesdropper Collusion arXiv 2024 Link
UA-PDFL: A Personalized Approach for Decentralized Federated Learning arXiv 2024 Link
UIFV: Data Reconstruction Attack in Vertical Federated Learning arXiv 2024 Link
UnSeenTimeQA: Time-Sensitive Question-Answering Beyond LLMs' Memorization arXiv 2024 Link
Uncovering Latent Memories: Assessing Data Leakage and Memorization Patterns in Frontier AI Models arXiv 2024 Link
Understanding Side-Channel Vulnerabilities in Superconducting Qubit Readout Architectures arXiv 2024 Link
Unlocking Visual Secrets: Inverting Features with Diffusion Priors for Image Reconstruction arXiv 2024 Link
Unprotected 4G/5G Control Procedures at Low Layers Considered Dangerous arXiv 2024 Link
Unveiling Privacy Vulnerabilities: Investigating the Role of Structure in Graph Data arXiv 2024 Link
Using Synthetic Data to Mitigate Unfairness and Preserve Privacy in Collaborative Machine Learning arXiv 2024 Link
Utilizing Large LanguageModels to Detect Privacy Leaks in Mini-App Code arXiv 2024 Link
VFLGAN: Vertical Federated Learning-based Generative Adversarial Network for Vertically Partitioned Data Publication arXiv 2024 Link
VLG-CBM: Training Concept Bottleneck Models with Vision-Language Guidance arXiv 2024 Link
VLSBench: Unveiling Visual Leakage in Multimodal Safety arXiv 2024 Link
VarBench: Robust Language Model Benchmarking Through Dynamic Variable Perturbation arXiv 2024 Link
VerifiableFL: Verifiable Claims for Federated Learning using Exclaves arXiv 2024 Link
Visual Privacy Auditing with Diffusion Models arXiv 2024 Link
Vulnerability Detection with Code Language Models: How Far Are We? arXiv 2024 Link
Wasserstein Differential Privacy arXiv 2024 Link
Weakly Private Information Retrieval from Heterogeneously Trusted Servers arXiv 2024 Link
Weakly-Private Information Retrieval From MDS-Coded Distributed Storage arXiv 2024 Link
What do we learn from inverting CLIP models? arXiv 2024 Link
Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs arXiv 2024 Link
WildlifeReID-10k: Wildlife re-identification dataset with 10k individual animals arXiv 2024 Link
fence.t.s: Closing Timing Channels in High-Performance Out-of-Order Cores through ISA-Supported Temporal Partitioning arXiv 2024 Link
modeLing: A Novel Dataset for Testing Linguistic Reasoning in Language Models arXiv 2024 Link
tsdataleaks: An R Package to Detect Potential Data Leaks in Forecasting Competitions arXiv 2024 Link
zkLLM: Zero Knowledge Proofs for Large Language Models arXiv 2024 Link

2023

Title Venue Year Link
"Can't Take the Pressure?": Examining the Challenges of Blood Pressure Estimation via Pulse Wave Analysis arXiv 2023 Link
A Compact LSTM-SVM Fusion Model for Long-Duration Cardiovascular Diseases Detection arXiv 2023 Link
A Comprehensive Study of Privacy Risks in Curriculum Learning arXiv 2023 Link
A Comprehensive Survey of Forgetting in Deep Learning Beyond Continual Learning arXiv 2023 Link
A Critical Review of Large Language Model on Software Engineering: An Example from ChatGPT and Automated Program Repair arXiv 2023 Link
A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks arXiv 2023 Link
A Few-Shot Approach to Dysarthric Speech Intelligibility Level Classification Using Transformers arXiv 2023 Link
A Floating-Point Secure Implementation of the Report Noisy Max with Gap Mechanism arXiv 2023 Link
A Forecasting-Based DLP Approach for Data Security arXiv 2023 Link
A Game-theoretic Framework for Privacy-preserving Federated Learning arXiv 2023 Link
A Generalized Look at Federated Learning: Survey and Perspectives arXiv 2023 Link
A Learning oriented DLP System based on Classification Model arXiv 2023 Link
A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data arXiv 2023 Link
A Meta-learning Framework for Tuning Parameters of Protection Mechanisms in Trustworthy Federated Learning arXiv 2023 Link
A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning arXiv 2023 Link
A Novel Approach for Machine Learning-based Load Balancing in High-speed Train System using Nested Cross Validation arXiv 2023 Link
A Novel Method Combines Moving Fronts, Data Decomposition and Deep Learning to Forecast Intricate Time Series arXiv 2023 Link
A Randomized Approach for Tight Privacy Accounting arXiv 2023 Link
A Split-and-Privatize Framework for Large Language Model Fine-Tuning arXiv 2023 Link
A Survey of Access Control Misconfiguration Detection Techniques arXiv 2023 Link
A Survey of What to Share in Federated Learning: Perspectives on Model Utility, Privacy Leakage, and Communication Efficiency arXiv 2023 Link
A Survey on Blockchain-Based Federated Learning and Data Privacy arXiv 2023 Link
A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems arXiv 2023 Link
A Theoretical Insight into Attack and Defense of Gradient Leakage in Transformer arXiv 2023 Link
A critical look at the evaluation of GNNs under heterophily: Are we really making progress? arXiv 2023 Link
AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks against Interpretable Models arXiv 2023 Link
Accelerating Secure and Verifiable Data Deletion in Cloud Storage via SGX and Blockchain arXiv 2023 Link
Accurate, Explainable, and Private Models: Providing Recourse While Minimizing Training Data Leakage arXiv 2023 Link
Adaptive Domain Inference Attack with Concept Hierarchy arXiv 2023 Link
Adaptive Local Adversarial Attacks on 3D Point Clouds for Augmented Reality arXiv 2023 Link
Adaptive Privacy-Preserving Coded Computing With Hierarchical Task Partitioning arXiv 2023 Link
Adversarial Predictions of Data Distributions Across Federated Internet-of-Things Devices arXiv 2023 Link
An Achievable and Analytic Solution to Information Bottleneck for Gaussian Mixtures arXiv 2023 Link
An Improved Christofides Mechanism for Local Differential Privacy Framework arXiv 2023 Link
AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning arXiv 2023 Link
AnonPSI: An Anonymity Assessment Framework for PSI arXiv 2023 Link
Applying Plain Transformers to Real-World Point Clouds arXiv 2023 Link
Approximate reconstructability of quantum states and noisy quantum secret sharing schemes arXiv 2023 Link
Attend Who is Weak: Enhancing Graph Condensation via Cross-Free Adversarial Training arXiv 2023 Link
Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing arXiv 2023 Link
BLIAM: Literature-based Data Synthesis for Synergistic Drug Combination Prediction arXiv 2023 Link
BPKD: Boundary Privileged Knowledge Distillation For Semantic Segmentation arXiv 2023 Link
BRNES: Enabling Security and Privacy-aware Experience Sharing in Multiagent Robotic and Autonomous Systems arXiv 2023 Link
Bag of Tricks for Training Data Extraction from Language Models arXiv 2023 Link
Balancing Privacy Protection and Interpretability in Federated Learning arXiv 2023 Link
Bayesian sparsification for deep neural networks with Bayesian model reduction arXiv 2023 Link
Be Careful What You Smooth For: Label Smoothing Can Be a Privacy Shield but Also a Catalyst for Model Inversion Attacks arXiv 2023 Link
BeamSec: A Practical mmWave Physical Layer Security Scheme Against Strong Adversaries arXiv 2023 Link
Benchmarking Pretrained Vision Embeddings for Near- and Duplicate Detection in Medical Images arXiv 2023 Link
Benchmarking and Enhancing Disentanglement in Concept-Residual Models arXiv 2023 Link
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems arXiv 2023 Link
Beyond Gradient and Priors in Privacy Attacks: Leveraging Pooler Layer Inputs of Language Models in Federated Learning arXiv 2023 Link
Black-box Membership Inference Attacks against Fine-tuned Diffusion Models arXiv 2023 Link
Blockchain-empowered Federated Learning for Healthcare Metaverses: User-centric Incentive Mechanism with Optimal Data Freshness arXiv 2023 Link
Blockchain-enabled Data Governance for Privacy-Preserved Sharing of Confidential Data arXiv 2023 Link
Boosting Model Inversion Attacks with Adversarial Examples arXiv 2023 Link
Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack arXiv 2023 Link
Breaking the Silence: the Threats of Using LLMs in Software Engineering arXiv 2023 Link
ByzSecAgg: A Byzantine-Resistant Secure Aggregation Scheme for Federated Learning Based on Coded Computing and Vector Commitment arXiv 2023 Link
CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation arXiv 2023 Link
CSI-Based Efficient Self-Quarantine Monitoring System Using Branchy Convolution Neural Network arXiv 2023 Link
CSMeD: Bridging the Dataset Gap in Automated Citation Screening for Systematic Literature Reviews arXiv 2023 Link
Cal-SFDA: Source-Free Domain-adaptive Semantic Segmentation with Differentiable Expected Calibration Error arXiv 2023 Link
Can LLMs Effectively Leverage Graph Structural Information through Prompts, and Why? arXiv 2023 Link
Can Membership Inferencing be Refuted? arXiv 2023 Link
Causality-Inspired Fair Representation Learning for Multimodal Recommendation arXiv 2023 Link
Certified randomness in tight space arXiv 2023 Link
Checking and Automating Confidentiality Theory in Isabelle/UTP arXiv 2023 Link
Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities arXiv 2023 Link
Citadel: Simple Spectre-Safe Isolation For Real-World Programs That Share Memory arXiv 2023 Link
Class Attribute Inference Attacks: Inferring Sensitive Class Information by Diffusion-Based Attribute Manipulations arXiv 2023 Link
Client-side Gradient Inversion Against Federated Learning from Poisoning arXiv 2023 Link
CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models arXiv 2023 Link
Collaborative Mean Estimation over Intermittently Connected Networks with Peer-To-Peer Privacy arXiv 2023 Link
Color Prompting for Data-Free Continual Unsupervised Domain Adaptive Person Re-Identification arXiv 2023 Link
Communication Efficient and Privacy-Preserving Federated Learning Based on Evolution Strategies arXiv 2023 Link
ConDefects: A New Dataset to Address the Data Leakage Concern for LLM-based Fault Localization and Program Repair arXiv 2023 Link
Condensed Prototype Replay for Class Incremental Learning arXiv 2023 Link
Configuring Timing Parameters to Ensure Execution-Time Opacity in Timed Automata arXiv 2023 Link
Considerations on the Theory of Training Models with Differential Privacy arXiv 2023 Link
Context-Aware Differential Privacy for Language Modeling arXiv 2023 Link
Controllable Inversion of Black-Box Face Recognition Models via Diffusion arXiv 2023 Link
Convergence Visualizer of Decentralized Federated Distillation with Reduced Communication Costs arXiv 2023 Link
Cosmology from LOFAR Two-metre Sky Survey Data Release 2: Angular Clustering of Radio Sources arXiv 2023 Link
CovarNav: Machine Unlearning via Model Inversion and Covariance Navigation arXiv 2023 Link
Cross Device Federated Intrusion Detector for Early Stage Botnet Propagation in IoT arXiv 2023 Link
Crossing Roads of Federated Learning and Smart Grids: Overview, Challenges, and Perspectives arXiv 2023 Link
DDMT: Denoising Diffusion Mask Transformer Models for Multivariate Time Series Anomaly Detection arXiv 2023 Link
DEPN: Detecting and Editing Privacy Neurons in Pretrained Language Models arXiv 2023 Link
DPGOMI: Differentially Private Data Publishing with Gaussian Optimized Model Inversion arXiv 2023 Link
DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming arXiv 2023 Link
DPMLBench: Holistic Evaluation of Differentially Private Machine Learning arXiv 2023 Link
DPSUR: Accelerating Differentially Private Stochastic Gradient Descent Using Selective Update and Release arXiv 2023 Link
Data Encoding For Healthcare Data Democratisation and Information Leakage Prevention arXiv 2023 Link
Data leakage in cross-modal retrieval training: A case study arXiv 2023 Link
Data-Free Distillation Improves Efficiency and Privacy in Federated Thorax Disease Analysis arXiv 2023 Link
Decentralized Graph Neural Network for Privacy-Preserving Recommendation arXiv 2023 Link
Deep Reinforcement Learning for Privacy-Preserving Task Offloading in Integrated Satellite-Terrestrial Networks arXiv 2023 Link
Defending Label Inference Attacks in Split Learning under Regression Setting arXiv 2023 Link
Differential Privacy with Higher Utility by Exploiting Coordinate-wise Disparity: Laplace Mechanism Can Beat Gaussian in High Dimensions arXiv 2023 Link
Differentially Private Decoupled Graph Convolutions for Multigranular Topology Protection arXiv 2023 Link
Differentially Private Over-the-Air Federated Learning Over MIMO Fading Channels arXiv 2023 Link
Differentially Private Secure Multiplication: Hiding Information in the Rubble of Noise arXiv 2023 Link
Differentially Private Streaming Data Release under Temporal Correlations via Post-processing arXiv 2023 Link
Digital Privacy Under Attack: Challenges and Enablers arXiv 2023 Link
Disentangled Information Bottleneck guided Privacy-Protective JSCC for Image Transmission arXiv 2023 Link
Distributed Optimization with Feasible Set Privacy arXiv 2023 Link
Do Backdoors Assist Membership Inference Attacks? arXiv 2023 Link
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App arXiv 2023 Link
Does Prompt-Tuning Language Model Ensure Privacy? arXiv 2023 Link
Don't Memorize; Mimic The Past: Federated Class Incremental Learning Without Episodic Memory arXiv 2023 Link
Dynamic Private Task Assignment under Differential Privacy arXiv 2023 Link
EZClone: Improving DNN Model Extraction Attack via Shape Distillation from GPU Execution Profiles arXiv 2023 Link
Edge-assisted U-Shaped Split Federated Learning with Privacy-preserving for Internet of Things arXiv 2023 Link
Efficient Deduplication and Leakage Detection in Large Scale Image Datasets with a focus on the CrowdAI Mapping Challenge Dataset arXiv 2023 Link
Efficient Network Representation for GNN-based Intrusion Detection arXiv 2023 Link
Efficient Vertical Federated Learning with Secure Aggregation arXiv 2023 Link
Efficient and Secure Federated Learning for Financial Applications arXiv 2023 Link
Efficiently Predicting Protein Stability Changes Upon Single-point Mutation with Large Language Models arXiv 2023 Link
Enabling Competitive Performance of Medical Imaging with Diffusion Model-generated Images without Privacy Leakage arXiv 2023 Link
Enhanced EEG-Based Mental State Classification : A novel approach to eliminate data leakage and improve training optimization for Machine Learning arXiv 2023 Link
Enhancing Accuracy-Privacy Trade-off in Differentially Private Split Learning arXiv 2023 Link
Enhancing Mobile Privacy and Security: A Face Skin Patch-Based Anti-Spoofing Approach arXiv 2023 Link
Estimating irregular water demands with physics-informed machine learning to inform leakage detection arXiv 2023 Link
Ethicist: Targeted Training Data Extraction Through Loss Smoothed Soft Prompting and Calibrated Confidence Estimation arXiv 2023 Link
Evaluating Online Bandit Exploration In Large-Scale Recommender System arXiv 2023 Link
Evaluating Privacy Leakage in Split Learning arXiv 2023 Link
Exploit the Leak: Understanding Risks in Biometric Matchers arXiv 2023 Link
Exploratory Analysis of Federated Learning Methods with Differential Privacy on MIMIC-III arXiv 2023 Link
Explore In-Context Learning for 3D Point Cloud Understanding arXiv 2023 Link
Expressive variational quantum circuits provide inherent privacy in federated learning arXiv 2023 Link
Extending and Defending Attacks on Reset Operations in Quantum Computers arXiv 2023 Link
FCB-SwinV2 Transformer for Polyp Segmentation arXiv 2023 Link
FLAG: Fast Label-Adaptive Aggregation for Multi-label Classification in Federated Learning arXiv 2023 Link
FLShield: A Validation Based Federated Learning Framework to Defend Against Poisoning Attacks arXiv 2023 Link
Face Encryption via Frequency-Restricted Identity-Agnostic Attacks arXiv 2023 Link
Facial Data Minimization: Shallow Model as Your Privacy Filter arXiv 2023 Link
Fairness and Privacy-Preserving in Federated Learning: A Survey arXiv 2023 Link
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks arXiv 2023 Link
Feature-Rich Audio Model Inversion for Data-Free Knowledge Distillation Towards General Sound Classification arXiv 2023 Link
FedAgg: Adaptive Federated Learning with Aggregated Gradients arXiv 2023 Link
FedBIAD: Communication-Efficient and Accuracy-Guaranteed Federated Learning with Bayesian Inference-Based Adaptive Dropout arXiv 2023 Link
FedConv: Enhancing Convolutional Neural Networks for Handling Data Heterogeneity in Federated Learning arXiv 2023 Link
FedDBL: Communication and Data Efficient Federated Deep-Broad Learning for Histopathological Tissue Classification arXiv 2023 Link
FedML-HE: An Efficient Homomorphic-Encryption-Based Privacy-Preserving Federated Learning System arXiv 2023 Link
FedPDD: A Privacy-preserving Double Distillation Framework for Cross-silo Federated Recommendation arXiv 2023 Link
FedVS: Straggler-Resilient and Privacy-Preserving Vertical Federated Learning for Split Models arXiv 2023 Link
Federated Classification in Hyperbolic Spaces via Secure Aggregation of Convex Hulls arXiv 2023 Link
Federated Knowledge Graph Completion via Latent Embedding Sharing and Tensor Factorization arXiv 2023 Link
Federated Learning for Metaverse: A Survey arXiv 2023 Link
Federated Learning via Input-Output Collaborative Distillation arXiv 2023 Link
Federated Learning with Reduced Information Leakage and Computation arXiv 2023 Link
Federated Learning-based Vehicle Trajectory Prediction against Cyberattacks arXiv 2023 Link
Federated Quantum Machine Learning with Differential Privacy arXiv 2023 Link
FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users arXiv 2023 Link
Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation arXiv 2023 Link
Finding Vulnerabilities in Mobile Application APIs: A Modular Programmatic Approach arXiv 2023 Link
FlowFormer++: Masked Cost Volume Autoencoding for Pretraining Optical Flow Estimation arXiv 2023 Link
Foreseeing Reconstruction Quality of Gradient Inversion: An Optimization Perspective arXiv 2023 Link
GAM : Gradient Attention Module of Optimization for Point Clouds Analysis arXiv 2023 Link
GAN-based Vertical Federated Learning for Label Protection in Binary Classification arXiv 2023 Link
GIFD: A Generative Gradient Inversion Method with Feature Domain Optimization arXiv 2023 Link
GPT Can Solve Mathematical Problems Without a Calculator arXiv 2023 Link
Gaussian process regression and conditional Karhunen-Loéve models for data assimilation in inverse problems arXiv 2023 Link
Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models arXiv 2023 Link
GeoLocator: a location-integrated large multimodal model for inferring geo-privacy arXiv 2023 Link
Gotcha! This Model Uses My Code! Evaluating Membership Leakage Risks in Code Models arXiv 2023 Link
Gradient-Free Privacy Leakage in Federated Language Models through Selective Weight Tampering arXiv 2023 Link
GraphMoco:a Graph Momentum Contrast Model that Using Multimodel Structure Information for Large-scale Binary Function Representation Learning arXiv 2023 Link
Harnessing Inherent Noises for Privacy Preservation in Quantum Machine Learning arXiv 2023 Link
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption arXiv 2023 Link
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs arXiv 2023 Link
How You Split Matters: Data Leakage and Subject Characteristics Studies in Longitudinal Brain MRI Analysis arXiv 2023 Link
HuRef: HUman-REadable Fingerprint for Large Language Models arXiv 2023 Link
Huff-DP: Huffman Coding based Differential Privacy Mechanism for Real-Time Data arXiv 2023 Link
Hyperfuzzing: black-box security hypertesting with a grey-box fuzzer arXiv 2023 Link
Image Captions are Natural Prompts for Text-to-Image Models arXiv 2023 Link
Impedance Leakage Vulnerability and its Utilization in Reverse-engineering Embedded Software arXiv 2023 Link
Improving Input-label Mapping with Demonstration Replay for In-context Learning arXiv 2023 Link
Improving the Model Consistency of Decentralized Federated Learning arXiv 2023 Link
InVAErt networks: a data-driven framework for model synthesis and identifiability analysis arXiv 2023 Link
InferDPT: Privacy-Preserving Inference for Black-box Large Language Model arXiv 2023 Link
Information Leakage from Data Updates in Machine Learning Models arXiv 2023 Link
Information Leakage from Optical Emanations arXiv 2023 Link
Information-Theoretic Privacy-Preserving Schemes Based On Perfect Privacy arXiv 2023 Link
Initialization Matters: Privacy-Utility Analysis of Overparameterized Neural Networks arXiv 2023 Link
InstructTTS: Modelling Expressive TTS in Discrete Latent Space with Natural Language Style Prompt arXiv 2023 Link
Integrated Sensing, Navigation, and Communication for Secure UAV Networks with a Mobile Eavesdropper arXiv 2023 Link
Integration of Digital Twin and Federated Learning for Securing Vehicular Internet of Things arXiv 2023 Link
Introducing Model Inversion Attacks on Automatic Speaker Recognition arXiv 2023 Link
Inverse classification with logistic and softmax classifiers: efficient optimization arXiv 2023 Link
Is ChatGPT the Ultimate Programming Assistant -- How far is it? arXiv 2023 Link
KBody: Towards general, robust, and aligned monocular whole-body estimation arXiv 2023 Link
LDP-Feat: Image Features with Local Differential Privacy arXiv 2023 Link
LEAT: Towards Robust Deepfake Disruption in Real-World Scenarios via Latent Ensemble Attack arXiv 2023 Link
Label-Only Model Inversion Attacks via Knowledge Transfer arXiv 2023 Link
Language Model Inversion arXiv 2023 Link
Leak Proof PDBBind: A Reorganized Dataset of Protein-Ligand Complexes for More Generalizable Binding Affinity Prediction arXiv 2023 Link
Leave-one-out Distinguishability in Machine Learning arXiv 2023 Link
Leveraging Speaker Embeddings with Adversarial Multi-task Learning for Age Group Classification arXiv 2023 Link
Localization Is All You Evaluate: Data Leakage in Online Mapping Datasets and How to Fix It arXiv 2023 Link
LooGLE: Can Long-Context Language Models Understand Long Contexts? arXiv 2023 Link
Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption arXiv 2023 Link
Low-Complexity Dynamic Directional Modulation: Vulnerability and Information Leakage arXiv 2023 Link
M3AE: Multimodal Representation Learning for Brain Tumor Segmentation with Missing Modalities arXiv 2023 Link
M3FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System arXiv 2023 Link
MGMAE: Motion Guided Masking for Video Masked Autoencoding arXiv 2023 Link
MME: A Comprehensive Evaluation Benchmark for Multimodal Large Language Models arXiv 2023 Link
Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction arXiv 2023 Link
Make Landscape Flatter in Differentially Private Federated Learning arXiv 2023 Link
Making Translators Privacy-aware on the User's Side arXiv 2023 Link
Managed Geo-Distributed Feature Store: Architecture and System Design arXiv 2023 Link
Masked Trajectory Models for Prediction, Representation, and Control arXiv 2023 Link
Massive Thirring Model: Inverse Scattering and Soliton Resolution arXiv 2023 Link
Maximal Information Leakage from Quantum Encoding of Classical Data arXiv 2023 Link
McFIL: Model Counting Functionality-Inherent Leakage arXiv 2023 Link
Measuring the Privacy Leakage via Graph Reconstruction Attacks on Simplicial Neural Networks (Student Abstract) arXiv 2023 Link
Medical Question Summarization with Entity-driven Contrastive Learning arXiv 2023 Link
Mitigating Adversarial Attacks in Federated Learning with Trusted Execution Environments arXiv 2023 Link
Mitigating Cross-client GANs-based Attack in Federated Learning arXiv 2023 Link
Mitigating the Risk of Knowledge Leakage in Knowledge Intensive Organizations: a Mobile Device Perspective arXiv 2023 Link
Mitigating the source-side channel vulnerability by characterization of photon statistics arXiv 2023 Link
Model Conversion via Differentially Private Data-Free Distillation arXiv 2023 Link
Model Inversion Attack via Dynamic Memory Learning arXiv 2023 Link
Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks arXiv 2023 Link
Modeling Inverse Demand Function with Explainable Dual Neural Networks arXiv 2023 Link
Multimodal machine learning for 3-dimensional characterization of hidden groundwater and geothermal resources arXiv 2023 Link
NIPD: A Federated Learning Person Detection Benchmark Based on Real-World Non-IID Data arXiv 2023 Link
NaturalInversion: Data-Free Image Synthesis Improving Real-World Consistency arXiv 2023 Link
Neural Network Analytic Continuation for Monte Carlo: Improvement by Statistical Errors arXiv 2023 Link
Non-Adaptive Coding for Two-Way Wiretap Channel with or without Cost Constraints arXiv 2023 Link
Noninterference Analysis of Reversible Systems: An Approach Based on Branching Bisimilarity arXiv 2023 Link
OASIS: Offsetting Active Reconstruction Attacks in Federated Learning arXiv 2023 Link
Objective Evaluation-based High-efficiency Learning Framework for Hyperspectral Image Classification arXiv 2023 Link
ObliuSky: Oblivious User-Defined Skyline Query Processing in the Cloud arXiv 2023 Link
On the Fine-Grained Hardness of Inverting Generative Models arXiv 2023 Link
On the Inherent Privacy Properties of Discrete Denoising Diffusion Models arXiv 2023 Link
On the Relationship Between Information-Theoretic Privacy Metrics And Probabilistic Information Privacy arXiv 2023 Link
On the Universal Adversarial Perturbations for Efficient Data-free Adversarial Detection arXiv 2023 Link
On the physical layer security capabilities of reconfigurable intelligent surface empowered wireless systems arXiv 2023 Link
One-Time Universal Hashing Quantum Digital Signatures without Perfect Keys arXiv 2023 Link
Online Spatio-Temporal Correlation-Based Federated Learning for Traffic Flow Forecasting arXiv 2023 Link
Online search is more likely to lead students to validate true news than to refute false ones arXiv 2023 Link
Optimizing Privacy, Utility and Efficiency in Constrained Multi-Objective Federated Learning arXiv 2023 Link
Outer Bounds on the CEO Problem with Privacy Constraints arXiv 2023 Link
Over-the-Air Federated Averaging with Limited Power and Privacy Budgets arXiv 2023 Link
P3LI5: Practical and Confidential Lawful Interception on the 5G Core arXiv 2023 Link
PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning arXiv 2023 Link
PATROL: Privacy-Oriented Pruning for Collaborative Inference Against Model Inversion Attacks arXiv 2023 Link
PEOPL: Characterizing Privately Encoded Open Datasets with Public Labels arXiv 2023 Link
PPIDSG: A Privacy-Preserving Image Distribution Sharing Scheme with GAN in Federated Learning arXiv 2023 Link
PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender arXiv 2023 Link
PROFL: A Privacy-Preserving Federated Learning Method with Stringent Defense Against Poisoning Attacks arXiv 2023 Link
PUGAN: Physical Model-Guided Underwater Image Enhancement Using GAN with Dual-Discriminators arXiv 2023 Link
PandaLM: An Automatic Evaluation Benchmark for LLM Instruction Tuning Optimization arXiv 2023 Link
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes arXiv 2023 Link
Performance Analysis of Finite Blocklength Transmissions Over Wiretap Fading Channels: An Average Information Leakage Perspective arXiv 2023 Link
Poincaré Differential Privacy for Hierarchy-Aware Graph Embedding arXiv 2023 Link
PolicyGPT: Automated Analysis of Privacy Policies with Large Language Models arXiv 2023 Link
Precise Phase Error Rate Analysis for Quantum Key Distribution with Phase Postselection arXiv 2023 Link
PriPrune: Quantifying and Preserving Privacy in Pruned Federated Learning arXiv 2023 Link
PrivLM-Bench: A Multi-level Privacy Evaluation Benchmark for Language Models arXiv 2023 Link
Privacy Assessment on Reconstructed Images: Are Existing Evaluation Metrics Faithful to Human Perception? arXiv 2023 Link
Privacy Computing Meets Metaverse: Necessity, Taxonomy and Challenges arXiv 2023 Link
Privacy Preserving Federated Learning with Convolutional Variational Bottlenecks arXiv 2023 Link
Privacy Risks in Reinforcement Learning for Household Robots arXiv 2023 Link
Privacy and Accuracy Implications of Model Complexity and Integration in Heterogeneous Federated Learning arXiv 2023 Link
Privacy and Security in Ubiquitous Integrated Sensing and Communication: Threats, Challenges and Future Directions arXiv 2023 Link
Privacy-Aware Data Acquisition under Data Similarity in Regression Markets arXiv 2023 Link
Privacy-Preserved Neural Graph Databases arXiv 2023 Link
Privacy-Preserving Federated Discovery of DNA Motifs with Differential Privacy arXiv 2023 Link
Privacy-Preserving Hierarchical Anonymization Framework over Encrypted Data arXiv 2023 Link
Privacy-Preserving Individual-Level COVID-19 Infection Prediction via Federated Graph Learning arXiv 2023 Link
Privacy-Preserving Joint Edge Association and Power Optimization for the Internet of Vehicles via Federated Multi-Agent Reinforcement Learning arXiv 2023 Link
Privacy-Preserving Load Forecasting via Personalized Model Obfuscation arXiv 2023 Link
Privacy-Preserving Push-Pull Method for Decentralized Optimization via State Decomposition arXiv 2023 Link
Privacy-Preserving Task-Oriented Semantic Communications Against Model Inversion Attacks arXiv 2023 Link
Privacy-Preserving Video Conferencing via Thermal-Generative Images arXiv 2023 Link
Privacy-preserving and Uncertainty-aware Federated Trajectory Prediction for Connected Autonomous Vehicles arXiv 2023 Link
Privacy-preserving design of graph neural networks with applications to vertical federated learning arXiv 2023 Link
Privacy-preserving quantum federated learning via gradient hiding arXiv 2023 Link
PrivacyMind: Large Language Models Can Be Contextual Privacy Protection Learners arXiv 2023 Link
Private Gradient Estimation is Useful for Generative Modeling arXiv 2023 Link
Private Read-Update-Write with Controllable Information Leakage for Storage-Efficient Federated Learning with Top $r$ Sparsification arXiv 2023 Link
ProPILE: Probing Privacy Leakage in Large Language Models arXiv 2023 Link
Probably Approximately Correct Federated Learning arXiv 2023 Link
Probing the Transition to Dataset-Level Privacy in ML Models Using an Output-Specific and Data-Resolved Privacy Profile arXiv 2023 Link
Protecting User Privacy in Remote Conversational Systems: A Privacy-Preserving framework based on text sanitization arXiv 2023 Link
Proving the Absence of Microarchitectural Timing Channels arXiv 2023 Link
Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network arXiv 2023 Link
Quadratic Functional Encryption for Secure Training in Vertical Federated Learning arXiv 2023 Link
Quantifying Association Capabilities of Large Language Models and Its Implications on Privacy Leakage arXiv 2023 Link
RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation arXiv 2023 Link
Raptor Encoding for Low-Latency Concurrent Multi-PDU Session Transmission with Security Consideration in B5G Edge Network arXiv 2023 Link
Re-Temp: Relation-Aware Temporal Representation Learning for Temporal Knowledge Graph Completion arXiv 2023 Link
Re-thinking Model Inversion Attacks Against Deep Neural Networks arXiv 2023 Link
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense arXiv 2023 Link
Reconciling AI Performance and Data Reconstruction Resilience for Medical Imaging arXiv 2023 Link
Reinforcement Learning-Based Black-Box Model Inversion Attacks arXiv 2023 Link
Relating EEG to continuous speech using deep neural networks: a review arXiv 2023 Link
Reliable Generation of Privacy-preserving Synthetic Electronic Health Record Time Series via Diffusion Models arXiv 2023 Link
Report of the Medical Image De-Identification (MIDI) Task Group -- Best Practices and Recommendations arXiv 2023 Link
Rethinking Cross-Subject Data Splitting for Brain-to-Text Decoding arXiv 2023 Link
Rethinking Model Inversion Attacks With Patch-Wise Reconstruction arXiv 2023 Link
Rethinking Speech Recognition with A Multimodal Perspective via Acoustic and Semantic Cooperative Decoding arXiv 2023 Link
Rethinking the Evaluation Protocol of Domain Generalization arXiv 2023 Link
Revisiting Variable Ordering for Real Quantifier Elimination using Machine Learning arXiv 2023 Link
SSO-Monitor: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild arXiv 2023 Link
STAR-RIS-Assisted Privacy Protection in Semantic Communication System arXiv 2023 Link
Scale Federated Learning for Label Set Mismatch in Medical Image Classification arXiv 2023 Link
Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction arXiv 2023 Link
SciEval: A Multi-Level Large Language Model Evaluation Benchmark for Scientific Research arXiv 2023 Link
Secret-Keeping in Question Answering arXiv 2023 Link
Secure Block Joint Source-Channel Coding with Sequential Encoding arXiv 2023 Link
Secure Deep-JSCC Against Multiple Eavesdroppers arXiv 2023 Link
Secure Integrated Sensing and Communication arXiv 2023 Link
Secure Key from Quantum Discord arXiv 2023 Link
Secure Vertical Federated Learning Under Unreliable Connectivity arXiv 2023 Link
SecureBoost Hyperparameter Tuning via Multi-Objective Federated Learning arXiv 2023 Link
Security and Privacy Challenges in Deep Learning Models arXiv 2023 Link
Security and Privacy on Generative Data in AIGC: A Survey arXiv 2023 Link
SegPrompt: Boosting Open-world Segmentation via Category-level Prompt Learning arXiv 2023 Link
Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode arXiv 2023 Link
Semi-decentralized Federated Ego Graph Learning for Recommendation arXiv 2023 Link
Sensing-Enhanced Secure Communication: Joint Time Allocation and Beamforming Design arXiv 2023 Link
Sentence Embedding Leaks More Information than You Expect: Generative Embedding Inversion Attack to Recover the Whole Sentence arXiv 2023 Link
Share Your Representation Only: Guaranteed Improvement of the Privacy-Utility Tradeoff in Federated Learning arXiv 2023 Link
Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses arXiv 2023 Link
SoK: Pitfalls in Evaluating Black-Box Attacks arXiv 2023 Link
Sparse Federated Training of Object Detection in the Internet of Vehicles arXiv 2023 Link
Speaker anonymization using orthogonal Householder neural network arXiv 2023 Link
Speech Privacy Leakage from Shared Gradients in Distributed Learning arXiv 2023 Link
Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning arXiv 2023 Link
Split Without a Leak: Reducing Privacy Leakage in Split Learning arXiv 2023 Link
Split-and-Denoise: Protect large language model inference with local differential privacy arXiv 2023 Link
SplitAMC: Split Learning for Robust Automatic Modulation Classification arXiv 2023 Link
SplitGNN: Splitting GNN for Node Classification with Heterogeneous Attention arXiv 2023 Link
Stochastic dual coordinate descent with adaptive heavy ball momentum for linearly constrained convex optimization arXiv 2023 Link
Students Parrot Their Teachers: Membership Inference on Model Distillation arXiv 2023 Link
Surrogate Model Extension (SME): A Fast and Accurate Weight Update Attack on Federated Learning arXiv 2023 Link
Sync+Sync: A Covert Channel Built on fsync with Storage arXiv 2023 Link
Synthetic Misinformers: Generating and Combating Multimodal Misinformation arXiv 2023 Link
SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not? arXiv 2023 Link
Targeted Image Reconstruction by Sampling Pre-trained Diffusion Model arXiv 2023 Link
TeD-SPAD: Temporal Distinctiveness for Self-supervised Privacy-preservation for video Anomaly Detection arXiv 2023 Link
Temporal Gradient Inversion Attacks with Robust Optimization arXiv 2023 Link
Text-to-image Editing by Image Information Removal arXiv 2023 Link
The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks arXiv 2023 Link
The Model Inversion Eavesdropping Attack in Semantic Communication Systems arXiv 2023 Link
Tight Auditing of Differentially Private Machine Learning arXiv 2023 Link
Timeliness: A New Design Metric and a New Attack Surface arXiv 2023 Link
Topology-Dependent Privacy Bound For Decentralized Federated Learning arXiv 2023 Link
Toward the Tradeoffs between Privacy, Fairness and Utility in Federated Learning arXiv 2023 Link
Towards A Holistic Landscape of Situated Theory of Mind in Large Language Models arXiv 2023 Link
Towards Multiple References Era -- Addressing Data Leakage and Limited Reference Diversity in NLG Evaluation arXiv 2023 Link
Towards Runtime Customizable Trusted Execution Environment on FPGA-SoC arXiv 2023 Link
Towards the Flatter Landscape and Better Generalization in Federated Learning under Client-level Differential Privacy arXiv 2023 Link
Traces of Memorisation in Large Language Models for Code arXiv 2023 Link
Training Private Models That Know What They Don't Know arXiv 2023 Link
Transceiver Cooperative Learning-aided Semantic Communications Against Mismatched Background Knowledge Bases arXiv 2023 Link
Transient Attacks against the VMG-KLJN Secure Key Exchanger arXiv 2023 Link
TriMLP: Revenge of a MLP-like Architecture in Sequential Recommendation arXiv 2023 Link
UFPS: A unified framework for partially-annotated federated segmentation in heterogeneous data distribution arXiv 2023 Link
Unconditionally secure ciphers with a short key for a source with unknown statistics arXiv 2023 Link
Understanding Deep Gradient Leakage via Inversion Influence Functions arXiv 2023 Link
Unifying Privacy Measures via Maximal $(α,β)$-Leakage (M$α$beL) arXiv 2023 Link
Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation arXiv 2023 Link
Unstoppable Attack: Label-Only Model Inversion via Conditional Diffusion Model arXiv 2023 Link
Untargeted Near-collision Attacks on Biometrics: Real-world Bounds and Theoretical Limits arXiv 2023 Link
Unveiling the Role of Message Passing in Dual-Privacy Preservation on GNNs arXiv 2023 Link
User Consented Federated Recommender System Against Personalized Attribute Inference Attack arXiv 2023 Link
VeriDIP: Verifying Ownership of Deep Neural Networks through Privacy Leakage Fingerprints arXiv 2023 Link
Watch Out! Smartwatches as criminal tool and digital forensic investigations arXiv 2023 Link
What can we learn from Data Leakage and Unlearning for Law? arXiv 2023 Link
When Evolutionary Computation Meets Privacy arXiv 2023 Link
When Fairness Meets Privacy: Exploring Privacy Threats in Fair Binary Classifiers via Membership Inference Attacks arXiv 2023 Link
Where have you been? A Study of Privacy Risk for Point-of-Interest Recommendation arXiv 2023 Link
Why People Skip Music? On Predicting Music Skips using Deep Reinforcement Learning arXiv 2023 Link
Within-Dataset Disclosure Risk for Differential Privacy arXiv 2023 Link
XFedHunter: An Explainable Federated Learning Framework for Advanced Persistent Threat Detection in SDN arXiv 2023 Link
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME arXiv 2023 Link
Zero-Knowledge Proof-based Practical Federated Learning on Blockchain arXiv 2023 Link
ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching arXiv 2023 Link
ZhuJiu: A Multi-dimensional, Multi-faceted Chinese Benchmark for Large Language Models arXiv 2023 Link
cRVR: A Stackelberg Game Approach for Joint Privacy-Aware Video Requesting and Edge Caching arXiv 2023 Link
pFedSim: Similarity-Aware Model Aggregation Towards Personalized Federated Learning arXiv 2023 Link
λ-SecAgg: Partial Vector Freezing for Lightweight Secure Aggregation in Federated Learning arXiv 2023 Link

2022

Title Venue Year Link
$\texttt{GradICON}$: Approximate Diffeomorphisms via Gradient Inverse Consistency arXiv 2022 Link
A Bargaining Game for Personalized, Energy Efficient Split Learning over Wireless Networks arXiv 2022 Link
A Benchmark for Federated Hetero-Task Learning arXiv 2022 Link
A Consistent and Efficient Evaluation Strategy for Attribution Methods arXiv 2022 Link
A Data-Based Perspective on Transfer Learning arXiv 2022 Link
A Differentially Private Framework for Deep Learning with Convexified Loss Functions arXiv 2022 Link
A Framework for Evaluating Privacy-Utility Trade-off in Vertical Federated Learning arXiv 2022 Link
A Generalization of the Stratonovich's Value of Information and Application to Privacy-Utility Trade-off arXiv 2022 Link
A Holistic View on Data Protection for Sharing, Communicating, and Computing Environments: Taxonomy and Future Directions arXiv 2022 Link
A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices arXiv 2022 Link
A New Dimensionality Reduction Method Based on Hensel's Compression for Privacy Protection in Federated Learning arXiv 2022 Link
A Novel Location Free Link Prediction in Multiplex Social Networks arXiv 2022 Link
A Platform-Free Proof of Federated Learning Consensus Mechanism for Sustainable Blockchains arXiv 2022 Link
A Survey on Gradient Inversion: Attacks, Defenses and Future Directions arXiv 2022 Link
A Survey on Privacy of Personal and Non-Personal Data in B5G/6G Networks arXiv 2022 Link
A Unified Framework for Quantifying Privacy Risk in Synthetic Data arXiv 2022 Link
A Variational Formula for Infinity-Rényi Divergence with Applications to Information Leakage arXiv 2022 Link
A blockchain-based secure storage scheme for medical information arXiv 2022 Link
A kind of quantum dialogue protocols without information leakage assisted by auxiliary quantum operation arXiv 2022 Link
AGIC: Approximate Gradient Inversion Attack on Federated Learning arXiv 2022 Link
Abstract Interpretation-Based Data Leakage Static Analysis arXiv 2022 Link
Acceleration of Federated Learning with Alleviated Forgetting in Local Training arXiv 2022 Link
Adversarial Mutual Leakage Network for Cell Image Segmentation arXiv 2022 Link
Adversarial Representation Sharing: A Quantitative and Secure Collaborative Learning Framework arXiv 2022 Link
Adversarial Speaker Distillation for Countermeasure Model on Automatic Speaker Verification arXiv 2022 Link
Adversarially Robust Classification by Conditional Generative Model Inversion arXiv 2022 Link
Amplifying Membership Exposure via Data Poisoning arXiv 2022 Link
An Algorithm for Computing the Stratonovich's Value of Information arXiv 2022 Link
An Alphabet of Leakage Measures arXiv 2022 Link
An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems arXiv 2022 Link
An Automated Approach for Privacy Leakage Identification in IoT Apps arXiv 2022 Link
An Empirical Study on Data Leakage and Generalizability of Link Prediction Models for Issues and Commits arXiv 2022 Link
An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models arXiv 2022 Link
An Experimental Study on Private Aggregation of Teacher Ensemble Learning for End-to-End Speech Recognition arXiv 2022 Link
An Operational Approach to Information Leakage via Generalized Gain Functions arXiv 2022 Link
Analog Secure Distributed Matrix Multiplication over Complex Numbers arXiv 2022 Link
Analysing Training-Data Leakage from Gradients through Linear Systems and Gradient Matching arXiv 2022 Link
Analyzing Privacy Leakage in Machine Learning via Multiple Hypothesis Testing: A Lesson From Fano arXiv 2022 Link
Another Use of SMOTE for Interpretable Data Collaboration Analysis arXiv 2022 Link
Answering Count Queries for Genomic Data with Perfect Privacy arXiv 2022 Link
Application of Data Encryption in Chinese Named Entity Recognition arXiv 2022 Link
Application of federated learning techniques for arrhythmia classification using 12-lead ECG signals arXiv 2022 Link
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models arXiv 2022 Link
Assessing Privacy Leakage in Synthetic 3-D PET Imaging using Transversal GAN arXiv 2022 Link
Assessing the Effects of Hyperparameters on Knowledge Graph Embedding Quality arXiv 2022 Link
Asymmetric Local Information Privacy and the Watchdog Mechanism arXiv 2022 Link
Auditing Privacy Defenses in Federated Learning via Generative Gradient Leakage arXiv 2022 Link
AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks arXiv 2022 Link
Automatic detection of access control vulnerabilities via API specification processing arXiv 2022 Link
Behavioral Model For Live Detection of Apps Based Attack arXiv 2022 Link
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks arXiv 2022 Link
Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction arXiv 2022 Link
Biometric Identification Systems With Both Chosen and Generated Secret Keys by Allowing Correlation arXiv 2022 Link
Blockchain-based Federated Learning for Industrial Metaverses: Incentive Scheme with Optimal AoI arXiv 2022 Link
Bounding Training Data Reconstruction in Private (Deep) Learning arXiv 2022 Link
Bounds for Privacy-Utility Trade-off with Per-letter Privacy Constraints and Non-zero Leakage arXiv 2022 Link
CANIFE: Crafting Canaries for Empirical Privacy Measurement in Federated Learning arXiv 2022 Link
CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software arXiv 2022 Link
Can Shadows Reveal Biometric Information? arXiv 2022 Link
Canary Extraction in Natural Language Understanding Models arXiv 2022 Link
Channel State Information-Free Artificial Noise-Aided Location-Privacy Enhancement arXiv 2022 Link
Cluster Based Secure Multi-Party Computation in Federated Learning for Histopathology Images arXiv 2022 Link
Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis arXiv 2022 Link
Combing for Credentials: Active Pattern Extraction from Smart Reply arXiv 2022 Link
Combining Stochastic Defenses to Resist Gradient Inversion: An Ablation Study arXiv 2022 Link
Communication-Efficient Diffusion Strategy for Performance Improvement of Federated Learning with Non-IID Data arXiv 2022 Link
Concealing Sensitive Samples against Gradient Leakage in Federated Learning arXiv 2022 Link
Content Privacy Enforcement Models in Decentralized Online Social Networks: State of Play, Solutions, Limitations, and Future Directions arXiv 2022 Link
ConvMAE: Masked Convolution Meets Masked Autoencoders arXiv 2022 Link
Cryptographic Security Concerns on Timestamp Sharing via Public Channel in Quantum Key Distribution Systems arXiv 2022 Link
DRAG: Dynamic Region-Aware GCN for Privacy-Leaking Image Detection arXiv 2022 Link
Data Leakage and Evaluation Issues in Micro-Expression Analysis arXiv 2022 Link
Data Leakage in Federated Averaging arXiv 2022 Link
Data Leakage in Notebooks: Static Detection and Better Processes arXiv 2022 Link
Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems arXiv 2022 Link
Data Querying with Ciphertext Policy Attribute Based Encryption arXiv 2022 Link
Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes? arXiv 2022 Link
Data security as a top priority in the digital world: preserve data value by being proactive and thinking security first arXiv 2022 Link
Dataset Obfuscation: Its Applications to and Impacts on Edge Machine Learning arXiv 2022 Link
DeFTA: A Plug-and-Play Decentralized Replacement for FedAvg arXiv 2022 Link
Decentralized Complete Dictionary Learning via $\ell^{4}$-Norm Maximization arXiv 2022 Link
Decentralized Matrix Factorization with Heterogeneous Differential Privacy arXiv 2022 Link
Deep Equilibrium Approaches to Diffusion Models arXiv 2022 Link
DeepVulSeeker: A Novel Vulnerability Identification Framework via Code Graph Structure and Pre-training Mechanism arXiv 2022 Link
Defending against the Label-flipping Attack in Federated Learning arXiv 2022 Link
Defense Against Gradient Leakage Attacks via Learning to Obscure Data arXiv 2022 Link
Desirable Companion for Vertical Federated Learning: New Zeroth-Order Gradient Based Algorithm arXiv 2022 Link
Detecting Chronic Kidney Disease(CKD) at the Initial Stage: A Novel Hybrid Feature-selection Method and Robust Data Preparation Pipeline for Different ML Techniques arXiv 2022 Link
Detecting False Alarms from Automatic Static Analysis Tools: How Far are We? arXiv 2022 Link
Differential Privacy Guarantees for Stochastic Gradient Langevin Dynamics arXiv 2022 Link
Differentially Private ADMM-Based Distributed Discrete Optimal Transport for Resource Allocation arXiv 2022 Link
Differentially Private CutMix for Split Learning with Vision Transformer arXiv 2022 Link
Differentially Private Decentralized Optimization with Relay Communication arXiv 2022 Link
Differentially Private Generative Adversarial Networks with Model Inversion arXiv 2022 Link
Disentangling private classes through regularization arXiv 2022 Link
Distributed Non-Convex Optimization with One-Bit Compressors on Heterogeneous Data: Efficient and Resilient Algorithms arXiv 2022 Link
Distributed learning optimisation of Cox models can leak patient data: Risks and solutions arXiv 2022 Link
Distribution inference risks: Identifying and mitigating sources of leakage arXiv 2022 Link
Do Gradient Inversion Attacks Make Federated Learning Unsafe? arXiv 2022 Link
Dordis: Efficient Federated Learning with Dropout-Resilient Differential Privacy arXiv 2022 Link
Dropout is NOT All You Need to Prevent Gradient Leakage arXiv 2022 Link
Dynamic Event-Triggered Discrete-Time Linear Time-Varying System with Privacy-Preservation arXiv 2022 Link
ECG Heartbeat classification using deep transfer learning with Convolutional Neural Network and STFT technique arXiv 2022 Link
Efficacy of MRI data harmonization in the age of machine learning. A multicenter study across 36 datasets arXiv 2022 Link
Efficient Federated Learning on Knowledge Graphs via Privacy-preserving Relation Embedding Aggregation arXiv 2022 Link
Efficient Federated Learning with Spike Neural Networks for Traffic Sign Recognition arXiv 2022 Link
Efficient Private Storage of Sparse Machine Learning Data arXiv 2022 Link
Encrypted Semantic Communication Using Adversarial Training for Privacy Preserving arXiv 2022 Link
Enhancing Privacy against Inversion Attacks in Federated Learning by using Mixing Gradients Strategies arXiv 2022 Link
Exploiting Multiple EEG Data Domains with Adversarial Learning arXiv 2022 Link
Exploring Semantic Attributes from A Foundation Model for Federated Learning of Disjoint Label Spaces arXiv 2022 Link
Extracted BERT Model Leaks More Information than You Think! arXiv 2022 Link
Extracting Targeted Training Data from ASR Models, and How to Mitigate It arXiv 2022 Link
FIAT: Fine-grained Information Audit for Trustless Transborder Data Flow arXiv 2022 Link
FLVoogd: Robust And Privacy Preserving Federated Learning arXiv 2022 Link
FaceMAE: Privacy-Preserving Face Recognition via Masked Autoencoders arXiv 2022 Link
FadMan: Federated Anomaly Detection across Multiple Attributed Networks arXiv 2022 Link
Fault tolerant authenticated quantum dialogue using logical Bell states arXiv 2022 Link
Fault tolerant channel-encrypting quantum dialogue against collective noise arXiv 2022 Link
FedIIC: Towards Robust Federated Learning for Class-Imbalanced Medical Image Classification arXiv 2022 Link
Federated Bayesian Neural Regression: A Scalable Global Federated Gaussian Process arXiv 2022 Link
Federated Learning for Healthcare Domain - Pipeline, Applications and Challenges arXiv 2022 Link
Federated Learning on Heterogeneous and Long-Tailed Data via Classifier Re-Training with Federated Features arXiv 2022 Link
Federated Learning with Privacy-Preserving Ensemble Attention Distillation arXiv 2022 Link
Federated Stochastic Primal-dual Learning with Differential Privacy arXiv 2022 Link
Few-Shot Unlearning by Model Inversion arXiv 2022 Link
Finite Time Privacy Preserving Quantized Average Consensus with Transmission Stopping arXiv 2022 Link
Frequency Estimation of Evolving Data Under Local Differential Privacy arXiv 2022 Link
Frequency Throttling Side-Channel Attack arXiv 2022 Link
Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints arXiv 2022 Link
Function Computation Without Secure Links: Information and Leakage Rates arXiv 2022 Link
GAN-based Domain Inference Attack arXiv 2022 Link
Get your Foes Fooled: Proximal Gradient Split Learning for Defense against Model Inversion Attacks on IoMT data arXiv 2022 Link
Global dynamics of neural mass models arXiv 2022 Link
GradViT: Gradient Inversion of Vision Transformers arXiv 2022 Link
Gradient Obfuscation Gives a False Sense of Security in Federated Learning arXiv 2022 Link
Guaranteeing Timed Opacity using Parametric Timed Model Checking arXiv 2022 Link
Guidance Through Surrogate: Towards a Generic Diagnostic Attack arXiv 2022 Link
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning arXiv 2022 Link
Heterogeneous Graph Neural Network for Privacy-Preserving Recommendation arXiv 2022 Link
Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks arXiv 2022 Link
Hidden in Plain Sight: Exploring Encrypted Channels in Android apps arXiv 2022 Link
How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers arXiv 2022 Link
How Much Privacy Does Federated Learning with Secure Aggregation Guarantee? arXiv 2022 Link
Hyper-differential sensitivity analysis for nonlinear Bayesian inverse problems arXiv 2022 Link
Hyperspectral Image Super-resolution with Deep Priors and Degradation Model Inversion arXiv 2022 Link
I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy arXiv 2022 Link
ILSGAN: Independent Layer Synthesis for Unsupervised Foreground-Background Segmentation arXiv 2022 Link
Improved Finite-Key Security Analysis of Quantum Key Distribution Against Trojan-Horse Attacks arXiv 2022 Link
Improved Weakly Private Information Retrieval Codes arXiv 2022 Link
Improving Federated Learning Face Recognition via Privacy-Agnostic Clusters arXiv 2022 Link
Improving Response Time of Home IoT Services in Federated Learning arXiv 2022 Link
Incentive-boosted Federated Crowdsourcing arXiv 2022 Link
Increasing Physical Layer Security through Hyperchaos in VLC Systems arXiv 2022 Link
Inflation of test accuracy due to data leakage in deep learning-based classification of OCT images arXiv 2022 Link
Information Leakage in Index Coding arXiv 2022 Link
Information Leakage in Index Coding With Sensitive and Non-Sensitive Messages arXiv 2022 Link
Information leakage resistant quantum dialogue against collective noise arXiv 2022 Link
Information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom arXiv 2022 Link
Intelligent Reflecting Surfaces for Enhanced Physical Layer Security in NOMA VLC Systems arXiv 2022 Link
Introspective Learning : A Two-Stage Approach for Inference in Neural Networks arXiv 2022 Link
Inverse uncertainty quantification of a mechanical model of arterial tissue with surrogate modeling arXiv 2022 Link
Invertible Tabular GANs: Killing Two Birds with OneStone for Tabular Data Synthesis arXiv 2022 Link
Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive Privacy Analysis and Beyond arXiv 2022 Link
Joint Optimization for Secure and Reliable Communications in Finite Blocklength Regime arXiv 2022 Link
Joint Privacy Enhancement and Quantization in Federated Learning arXiv 2022 Link
Just Fine-tune Twice: Selective Differential Privacy for Large Language Models arXiv 2022 Link
LSTMSPLIT: Effective SPLIT Learning based LSTM on Sequential Time-Series Data arXiv 2022 Link
Label Leakage and Protection from Forward Embedding in Vertical Federated Learning arXiv 2022 Link
Label-Only Model Inversion Attacks via Boundary Repulsion arXiv 2022 Link
Label-only Model Inversion Attack: The Attack that Requires the Least Information arXiv 2022 Link
Language Models as Knowledge Embeddings arXiv 2022 Link
Large payload bidirectional quantum secure direct communication without information leakage arXiv 2022 Link
Leakage and the Reproducibility Crisis in ML-based Science arXiv 2022 Link
Learned-Database Systems Security arXiv 2022 Link
Learning to Censor by Noisy Sampling arXiv 2022 Link
Learning to Invert: Simple Adaptive Attacks for Gradient Inversion in Federated Learning arXiv 2022 Link
Leveraging Adversarial Examples to Quantify Membership Information Leakage arXiv 2022 Link
LightFR: Lightweight Federated Recommendation with Privacy-preserving Matrix Factorization arXiv 2022 Link
Local inversion of maps: A new attack on Symmetric encryption, RSA and ECDLP arXiv 2022 Link
Lossy Compression of Noisy Data for Private and Data-Efficient Learning arXiv 2022 Link
Lower Bounds for Rényi Differential Privacy in a Black-Box Setting arXiv 2022 Link
MC-GEN:Multi-level Clustering for Private Synthetic Data Generation arXiv 2022 Link
MOB-FL: Mobility-Aware Federated Learning for Intelligent Connected Vehicles arXiv 2022 Link
M^4I: Multi-modal Models Membership Inference arXiv 2022 Link
Machine Learning Security in Industry: A Quantitative Survey arXiv 2022 Link
Masked Jigsaw Puzzle: A Versatile Position Embedding for Vision Transformers arXiv 2022 Link
Measuring and Controlling Split Layer Privacy Leakage Using Fisher Information arXiv 2022 Link
Mesoscopic modeling of hidden spiking neurons arXiv 2022 Link
Minimizing Information Leakage under Padding Constraints arXiv 2022 Link
Misinformation Detection in Social Media Video Posts arXiv 2022 Link
Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It arXiv 2022 Link
Model Inversion Attacks against Graph Neural Networks arXiv 2022 Link
Model Segmentation for Storage Efficient Private Federated Learning with Top $r$ Sparsification arXiv 2022 Link
Modeling Global Distribution for Federated Learning with Label Distribution Skew arXiv 2022 Link
Muffliato: Peer-to-Peer Privacy Amplification for Decentralized Optimization and Averaging arXiv 2022 Link
Multi-party Quantum Private Comparison Protocol Based on Entanglement Swapping of Bell Entangled States arXiv 2022 Link
Multi-site benchmark classification of major depressive disorder using machine learning on cortical and subcortical measures arXiv 2022 Link
NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language arXiv 2022 Link
On Differential Privacy for Federated Learning in Wireless Systems with Multiple Base Stations arXiv 2022 Link
On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols arXiv 2022 Link
On the (In)security of Peer-to-Peer Decentralized Machine Learning arXiv 2022 Link
On the Choice of Databases in Differential Privacy Composition arXiv 2022 Link
On the Discredibility of Membership Inference Attacks arXiv 2022 Link
On the Privacy Effect of Data Enhancement via the Lens of Memorization arXiv 2022 Link
On the Privacy Risks of Algorithmic Recourse arXiv 2022 Link
On the Privacy-Utility Trade-off With and Without Direct Access to the Private Data arXiv 2022 Link
On the utility and protection of optimization with differential privacy and classic regularization techniques arXiv 2022 Link
On-device modeling of user's social context and familiar places from smartphone-embedded sensor data arXiv 2022 Link
One Bad Apple Can Spoil Your IPv6 Privacy arXiv 2022 Link
One Parameter Defense -- Defending against Data Inference Attacks via Differential Privacy arXiv 2022 Link
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization arXiv 2022 Link
Optimal design of large-scale nonlinear Bayesian inverse problems under model uncertainty arXiv 2022 Link
Over-the-Air Federated Learning with Privacy Protection via Correlated Additive Perturbations arXiv 2022 Link
PASS: A Parameter Audit-based Secure and Fair Federated Learning Scheme against Free-Rider Attack arXiv 2022 Link
PGFed: Personalize Each Client's Global Objective for Federated Learning arXiv 2022 Link
PPA: Preference Profiling Attack Against Federated Learning arXiv 2022 Link
PRIVIC: A privacy-preserving method for incremental collection of location data arXiv 2022 Link
Partially Oblivious Neural Network Inference arXiv 2022 Link
Personal Privacy Protection Problems in the Digital Age arXiv 2022 Link
Physical layer insecurity arXiv 2022 Link
Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks arXiv 2022 Link
Plug-In Inversion: Model-Agnostic Inversion for Vision with Data Augmentations arXiv 2022 Link
Pointwise Maximal Leakage arXiv 2022 Link
Predicting sensitive information leakage in IoT applications using flows-aware machine learning approach arXiv 2022 Link
Preserving Privacy in Federated Learning with Ensemble Cross-Domain Knowledge Distillation arXiv 2022 Link
Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models arXiv 2022 Link
Privacy Concerns Raised by Pervasive User Data Collection From Cyberspace and Their Countermeasures arXiv 2022 Link
Privacy Induces Robustness: Information-Computation Gaps and Sparse Mean Estimation arXiv 2022 Link
Privacy Leakage in Discrete Time Updating Systems arXiv 2022 Link
Privacy Leakage in Proactive VR Streaming: Modeling and Tradeoff arXiv 2022 Link
Privacy Leakage in Text Classification: A Data Extraction Approach arXiv 2022 Link
Privacy Leakage of Adversarial Training Models in Federated Learning Systems arXiv 2022 Link
Privacy Preserving Machine Learning for Electric Vehicles: A Survey arXiv 2022 Link
Privacy Preserving Release of Mobile Sensor Data arXiv 2022 Link
Privacy for Free: How does Dataset Condensation Help Privacy? arXiv 2022 Link
Privacy in Practice: Private COVID-19 Detection in X-Ray Images (Extended Version) arXiv 2022 Link
Privacy-Aware Adversarial Network in Human Mobility Prediction arXiv 2022 Link
Privacy-Aware Human Mobility Prediction via Adversarial Networks arXiv 2022 Link
Privacy-Preserving Collaborative Learning through Feature Extraction arXiv 2022 Link
Privacy-Preserving Data-Enabled Predictive Leading Cruise Control in Mixed Traffic arXiv 2022 Link
Privacy-Preserving Decentralized Inference with Graph Neural Networks in Wireless Networks arXiv 2022 Link
Privacy-Preserving Distributed Expectation Maximization for Gaussian Mixture Model using Subspace Perturbation arXiv 2022 Link
Privacy-Preserving Federated Learning via System Immersion and Random Matrix Encryption arXiv 2022 Link
Privacy-Preserving Synthetic Data Generation for Recommendation Systems arXiv 2022 Link
Privacy-aware Early Detection of COVID-19 through Adversarial Training arXiv 2022 Link
Private Graph Extraction via Feature Explanations arXiv 2022 Link
Private Read Update Write (PRUW) in Federated Submodel Learning (FSL): Communication Efficient Schemes With and Without Sparsification arXiv 2022 Link
Protecting Split Learning by Potential Energy Loss arXiv 2022 Link
Providing Location Information at Edge Networks: A Federated Learning-Based Approach arXiv 2022 Link
Purifier: Defending Data Inference Attacks via Transforming Confidence Scores arXiv 2022 Link
Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing arXiv 2022 Link
Quantitative Information Flow for Hardware: Advancing the Attack Landscape arXiv 2022 Link
Quantum dialogue based on quantum encryption with single photons in both polarization and spatial-mode degrees of freedom arXiv 2022 Link
Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state arXiv 2022 Link
Quantum secure dialogue with quantum encryption arXiv 2022 Link
R-DFCIL: Relation-Guided Representation Learning for Data-Free Class Incremental Learning arXiv 2022 Link
RAIN: RegulArization on Input and Network for Black-Box Domain Adaptation arXiv 2022 Link
RL-DistPrivacy: Privacy-Aware Distributed Deep Inference for low latency IoT systems arXiv 2022 Link
Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks arXiv 2022 Link
Rate-Privacy-Storage Tradeoff in Federated Learning with Top $r$ Sparsification arXiv 2022 Link
Reconstruction Attacks on Aggressive Relaxations of Differential Privacy arXiv 2022 Link
Redactor: A Data-centric and Individualized Defense Against Inference Attacks arXiv 2022 Link
Reduced order modeling inversion of mono static data in a multi-scattering environment arXiv 2022 Link
ResSFL: A Resistance Transfer Framework for Defending Model Inversion Attack in Split Federated Learning arXiv 2022 Link
Residue-based Label Protection Mechanisms in Vertical Logistic Regression arXiv 2022 Link
Revealing Cumulative Risks in Online Personal Information: A Data Narrative Study arXiv 2022 Link
Robust Fingerprinting of Genomic Databases arXiv 2022 Link
Robust and Secure Resource Allocation for ISAC Systems: A Novel Optimization Framework for Variable-Length Snapshots arXiv 2022 Link
SINE: SINgle Image Editing with Text-to-Image Diffusion Models arXiv 2022 Link
SPAct: Self-supervised Privacy Preservation for Action Recognition arXiv 2022 Link
SSMI: How to Make Objects of Interest Disappear without Accessing Object Detectors? arXiv 2022 Link
STELLA: Sparse Taint Analysis for Enclave Leakage Detection arXiv 2022 Link
Sanitization of Multimedia Content: A Survey of Techniques, Attacks, and Future Directions arXiv 2022 Link
Scalable and Sparsity-Aware Privacy-Preserving K-means Clustering with Application to Fraud Detection arXiv 2022 Link
SecSkyline: Fast Privacy-Preserving Skyline Queries over Encrypted Cloud Databases arXiv 2022 Link
Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources arXiv 2022 Link
Secret-Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels arXiv 2022 Link
Secure & Private Federated Neuroimaging arXiv 2022 Link
Secure Distributed Optimization Under Gradient Attacks arXiv 2022 Link
Secure Intelligent Reflecting Surface Aided Integrated Sensing and Communication arXiv 2022 Link
Secure Joint Communication and Sensing arXiv 2022 Link
Secure and Private Source Coding with Private Key and Decoder Side Information arXiv 2022 Link
Secure quantum dialogue via cavity QED arXiv 2022 Link
Security of decoy-state quantum key distribution with correlated intensity fluctuations arXiv 2022 Link
Semi-Private Computation of Data Similarity with Applications to Data Valuation and Pricing arXiv 2022 Link
Semi-quantum dialogue based on single photons arXiv 2022 Link
Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks arXiv 2022 Link
Skellam Mixture Mechanism: a Novel Approach to Federated Learning with Differential Privacy arXiv 2022 Link
Sketching for First Order Method: Efficient Algorithm for Low-Bandwidth Channel and Vulnerability arXiv 2022 Link
Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated Learning arXiv 2022 Link
SoK: Secure Human-centered Wireless Sensing arXiv 2022 Link
Social Networks are Divulging Your Identity behind Crypto Addresses arXiv 2022 Link
Social-Aware Clustered Federated Learning with Customized Privacy Preservation arXiv 2022 Link
Sparse Dynamical Features generation, application to Parkinson's Disease diagnosis arXiv 2022 Link
Split Learning without Local Weight Sharing to Enhance Client-side Data Privacy arXiv 2022 Link
Split-U-Net: Preventing Data Leakage in Split Learning for Collaborative Multi-Modal Brain Tumor Segmentation arXiv 2022 Link
SpyHammer: Understanding and Exploiting RowHammer under Fine-Grained Temperature Variations arXiv 2022 Link
Strategic Coalition for Data Pricing in IoT Data Markets arXiv 2022 Link
Strong Converse for Privacy Amplification against Quantum Side Information arXiv 2022 Link
Structural Consensus in Networks with Directed Topologies and Its Cryptographic Implementation arXiv 2022 Link
Subgraph Retrieval Enhanced Model for Multi-hop Knowledge Base Question Answering arXiv 2022 Link
Survey on the Convergence of Machine Learning and Blockchain arXiv 2022 Link
Swing Distillation: A Privacy-Preserving Knowledge Distillation Framework arXiv 2022 Link
Synthetic Text Generation with Differential Privacy: A Simple and Practical Recipe arXiv 2022 Link
Systematic Prevention of On-Core Timing Channels by Full Temporal Partitioning arXiv 2022 Link
TIDF-DLPM: Term and Inverse Document Frequency based Data Leakage Prevention Model arXiv 2022 Link
TOFU: Towards Obfuscated Federated Updates by Encoding Weight Updates into Gradients from Proxy Data arXiv 2022 Link
TabLeak: Tabular Data Leakage in Federated Learning arXiv 2022 Link
Take a Fresh Look at Recommender Systems from an Evaluation Standpoint arXiv 2022 Link
Technical Report: Assisting Backdoor Federated Learning with Whole Population Knowledge Alignment arXiv 2022 Link
Text Revealer: Private Text Reconstruction via Model Inversion Attacks against Transformers arXiv 2022 Link
The Economics of Privacy and Utility: Investment Strategies arXiv 2022 Link
The Privacy Onion Effect: Memorization is Relative arXiv 2022 Link
Toward Secure and Private Over-the-Air Federated Learning arXiv 2022 Link
Towards Privacy-Preserving, Real-Time and Lossless Feature Matching arXiv 2022 Link
Towards learning to explain with concept bottleneck models: mitigating information leakage arXiv 2022 Link
Trading Off Privacy, Utility and Efficiency in Federated Learning arXiv 2022 Link
Trusted IP solution in multi-tenant cloud FPGA platform arXiv 2022 Link
Turning a Curse into a Blessing: Enabling In-Distribution-Data-Free Backdoor Removal via Stabilized Model Inversion arXiv 2022 Link
Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation arXiv 2022 Link
Unsupervised Context Aware Sentence Representation Pretraining for Multi-lingual Dense Retrieval arXiv 2022 Link
Unsupervised Graph Outlier Detection: Problem Revisit, New Insight, and Superior Method arXiv 2022 Link
User-Level Differential Privacy against Attribute Inference Attack of Speech Emotion Recognition in Federated Learning arXiv 2022 Link
Utility Assessment of Synthetic Data Generation Methods arXiv 2022 Link
Variational Model Inversion Attacks arXiv 2022 Link
Verifying Learning-Based Robotic Navigation Systems arXiv 2022 Link
Vibration Compensation of Delta 3D Printer with Position-varying Dynamics using Filtered B-Splines arXiv 2022 Link
Visual Concepts Tokenization arXiv 2022 Link
Visual Transformer Meets CutMix for Improved Accuracy, Communication Efficiency, and Data Privacy in Split Learning arXiv 2022 Link
VoicePrivacy 2022 System Description: Speaker Anonymization with Feature-matched F0 Trajectories arXiv 2022 Link
When Digital Economy Meets Web3.0: Applications and Challenges arXiv 2022 Link
White-box Inference Attacks against Centralized Machine Learning and Federated Learning arXiv 2022 Link
Wireless Image Transmission with Semantic and Security Awareness arXiv 2022 Link
You Are What You Write: Preserving Privacy in the Era of Large Language Models arXiv 2022 Link
You Don't Know My Favorite Color: Preventing Dialogue Representations from Revealing Speakers' Private Personas arXiv 2022 Link
Zero-Shot Machine Unlearning arXiv 2022 Link
indic-punct: An automatic punctuation restoration and inverse text normalization framework for Indic languages arXiv 2022 Link

2021

Title Venue Year Link
"It's a Trap!"-How Speculation Invariance Can Be Abused with Forward Speculative Interference arXiv 2021 Link
A Case Study of Intra-library Privacy Issues on Android GPS Navigation Apps arXiv 2021 Link
A Communication-Efficient and Privacy-Aware Distributed Algorithm for Sparse PCA arXiv 2021 Link
A Dispersed Federated Learning Framework for 6G-Enabled Autonomous Driving Cars arXiv 2021 Link
A Federated Data-Driven Evolutionary Algorithm arXiv 2021 Link
A Federated Learning Framework for Non-Intrusive Load Monitoring arXiv 2021 Link
A Novel Data Encryption Method Inspired by Adversarial Attacks arXiv 2021 Link
A Privacy-Preserving and Trustable Multi-agent Learning Framework arXiv 2021 Link
A Quantitative Metric for Privacy Leakage in Federated Learning arXiv 2021 Link
A Real-time Defense against Website Fingerprinting Attacks arXiv 2021 Link
A Review of Confidentiality Threats Against Embedded Neural Network Models arXiv 2021 Link
A Systematic Survey of Blockchained Federated Learning arXiv 2021 Link
A Temporal Logic for Strategic Hyperproperties arXiv 2021 Link
A fast algorithm for solving a three-dimensional inverse multiple frequency problems of scalar acoustics in a cylindrical region arXiv 2021 Link
A methodology to identify identical single-board computers based on hardware behavior fingerprinting arXiv 2021 Link
A new view of the solar interface region from the Interface Region Imaging Spectrograph (IRIS) arXiv 2021 Link
A novel approach to reducing information leakage for quantum key distribution arXiv 2021 Link
ADePT: Auto-encoder based Differentially Private Text Transformation arXiv 2021 Link
AMPPERE: A Universal Abstract Machine for Privacy-Preserving Entity Resolution Evaluation arXiv 2021 Link
APRIL: Finding the Achilles' Heel on Privacy for Vision Transformers arXiv 2021 Link
Accelerating Parameter Extraction of Power MOSFET Models Using Automatic Differentiation arXiv 2021 Link
Adaptive Modeling Against Adversarial Attacks arXiv 2021 Link
Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning arXiv 2021 Link
An Adversarial Transfer Network for Knowledge Representation Learning arXiv 2021 Link
An Analysis Of Protected Health Information Leakage In Deep-Learning Based De-Identification Algorithms arXiv 2021 Link
An Anonymous On-Street Parking Authentication Scheme via Zero-Knowledge Set Membership Proof arXiv 2021 Link
An Attribute-Aligned Strategy for Learning Speech Representation arXiv 2021 Link
An Efficient Learning Framework For Federated XGBoost Using Secret Sharing And Distributed Optimization arXiv 2021 Link
An explainable two-dimensional single model deep learning approach for Alzheimer's disease diagnosis and brain atrophy localization arXiv 2021 Link
Anonymization for Skeleton Action Recognition arXiv 2021 Link
Asynchronous Federated Learning on Heterogeneous Devices: A Survey arXiv 2021 Link
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds arXiv 2021 Link
Attribute Inference Attack of Speech Emotion Recognition in Federated Learning Settings arXiv 2021 Link
Audiomer: A Convolutional Transformer For Keyword Spotting arXiv 2021 Link
Augmenting Part-of-speech Tagging with Syntactic Information for Vietnamese and Chinese arXiv 2021 Link
AutoFL: Enabling Heterogeneity-Aware Energy Efficient Federated Learning arXiv 2021 Link
Automated Side Channel Analysis of Media Software with Manifold Learning arXiv 2021 Link
Avaddon ransomware: an in-depth analysis and decryption of infected systems arXiv 2021 Link
Batch Label Inference and Replacement Attacks in Black-Boxed Vertical Federated Learning arXiv 2021 Link
Biometric Verification Secure Against Malicious Adversaries arXiv 2021 Link
Biometrics: Trust, but Verify arXiv 2021 Link
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information arXiv 2021 Link
Black-box Gradient Attack on Graph Neural Networks: Deeper Insights in Graph-based Attack and Defense arXiv 2021 Link
Blockchain-based Transparency Framework for Privacy Preserving Third-party Services arXiv 2021 Link
Bounding Information Leakage in Machine Learning arXiv 2021 Link
Byzantine-Robust and Privacy-Preserving Framework for FedML arXiv 2021 Link
Byzantine-robust Federated Learning through Spatial-temporal Analysis of Local Model Updates arXiv 2021 Link
CAFE: Catastrophic Data Leakage in Vertical Federated Learning arXiv 2021 Link
CAPE: Context-Aware Private Embeddings for Private Language Learning arXiv 2021 Link
Causal-TGAN: Generating Tabular Data Using Causal Generative Adversarial Networks arXiv 2021 Link
Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners arXiv 2021 Link
CodedPaddedFL and CodedSecAgg: Straggler Mitigation and Secure Aggregation in Federated Learning arXiv 2021 Link
Compositional Vulnerability Detection with Insecurity Separation Logic (Extended Version) arXiv 2021 Link
Computation of COVID-19 epidemiological data in Hungary using dynamic model inversion arXiv 2021 Link
Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets arXiv 2021 Link
Configurable Privacy-Preserving Automatic Speech Recognition arXiv 2021 Link
Construction of Differentially Private Summaries over Fully Homomorphic Encryption arXiv 2021 Link
Contrastive Model Inversion for Data-Free Knowledge Distillation arXiv 2021 Link
Creating Unbiased Public Benchmark Datasets with Data Leakage Prevention for Predictive Process Monitoring arXiv 2021 Link
Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret arXiv 2021 Link
DLPFS: The Data Leakage Prevention FileSystem arXiv 2021 Link
DP-FP: Differentially Private Forward Propagation for Large Models arXiv 2021 Link
DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning arXiv 2021 Link
DTGAN: Differential Private Training for Tabular GANs arXiv 2021 Link
Data Disclosure with Non-zero Leakage and Non-invertible Leakage Matrix arXiv 2021 Link
Data Privacy and Utility Trade-Off Based on Mutual Information Neural Estimator arXiv 2021 Link
Database Matching Under Column Deletions arXiv 2021 Link
Decomposition of Global Feature Importance into Direct and Associative Components (DEDACT) arXiv 2021 Link
Deep Gaussian Processes for Biogeophysical Parameter Retrieval and Model Inversion arXiv 2021 Link
DeepAuditor: Distributed Online Intrusion Detection System for IoT devices via Power Side-channel Auditing arXiv 2021 Link
DeepGroup: Representation Learning for Group Recommendation with Implicit Feedback arXiv 2021 Link
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories arXiv 2021 Link
Demonstration of electron-nuclear decoupling at a spin clock transition arXiv 2021 Link
Designing Counterfactual Generators using Deep Model Inversion arXiv 2021 Link
Designing IRS-Aided MIMO Systems for Secrecy Enhancement arXiv 2021 Link
DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning arXiv 2021 Link
Differential Privacy Dynamics of Langevin Diffusion and Noisy Gradient Descent arXiv 2021 Link
Differential Privacy in Cognitive Radio Networks: A Comprehensive Survey arXiv 2021 Link
Differential Tracking Across Topical Webpages of Indian News Media arXiv 2021 Link
Differentially Private Methods for Releasing Results of Stability Analyses arXiv 2021 Link
Differentially private federated deep learning for multi-site medical image segmentation arXiv 2021 Link
Discrete Distribution Estimation with Local Differential Privacy: A Comparative Analysis arXiv 2021 Link
Do Not Let Privacy Overbill Utility: Gradient Embedding Perturbation for Private Learning arXiv 2021 Link
Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting arXiv 2021 Link
Edge Artificial Intelligence for 6G: Vision, Enabling Technologies, and Applications arXiv 2021 Link
EdgeML: Towards Network-Accelerated Federated Learning over Wireless Edge arXiv 2021 Link
Efficient CNN Building Blocks for Encrypted Data arXiv 2021 Link
Efficient Recovery of a Shared Secret via Cooperation: Applications to SDMM and PIR arXiv 2021 Link
Egocentric Image Captioning for Privacy-Preserved Passive Dietary Intake Monitoring arXiv 2021 Link
Evaluating Multiple Guesses by an Adversary via a Tunable Loss Function arXiv 2021 Link
Experimental Side Channel Analysis of BB84 QKD Source arXiv 2021 Link
Exploiting Explanations for Model Inversion Attacks arXiv 2021 Link
FED-$χ^2$: Privacy Preserving Federated Correlation Test arXiv 2021 Link
FairCMS: Cloud Media Sharing with Fair Copyright Protection arXiv 2021 Link
Fast-adapting and Privacy-preserving Federated Recommender System arXiv 2021 Link
FedDAG: Federated DAG Structure Learning arXiv 2021 Link
FedDPGAN: Federated Differentially Private Generative Adversarial Networks Framework for the Detection of COVID-19 Pneumonia arXiv 2021 Link
FedGraph: Federated Graph Learning with Intelligent Sampling arXiv 2021 Link
FedTriNet: A Pseudo Labeling Method with Three Players for Federated Semi-supervised Learning arXiv 2021 Link
Federated Deep Learning with Bayesian Privacy arXiv 2021 Link
Federated Learning Over Wireless Channels: Dynamic Resource Allocation and Task Scheduling arXiv 2021 Link
Federated Learning for Face Recognition with Gradient Correction arXiv 2021 Link
Federated Multi-View Learning for Private Medical Data Integration and Analysis arXiv 2021 Link
Federated Traffic Synthesizing and Classification Using Generative Adversarial Networks arXiv 2021 Link
Federated Two-stage Learning with Sign-based Voting arXiv 2021 Link
Floquet-Mode Traveling-Wave Parametric Amplifiers arXiv 2021 Link
GF-Flush: A GF(2) Algebraic Attack on Secure Scan Chains arXiv 2021 Link
GL-GIN: Fast and Accurate Non-Autoregressive Model for Joint Multiple Intent Detection and Slot Filling arXiv 2021 Link
GRNN: Generative Regression Neural Network -- A Data Leakage Attack for Federated Learning arXiv 2021 Link
Generalization Bounds for Stochastic Gradient Langevin Dynamics: A Unified View via Information Leakage Analysis arXiv 2021 Link
Generative Adversarial U-Net for Domain-free Medical Image Augmentation arXiv 2021 Link
Gradient Inversion with Generative Image Prior arXiv 2021 Link
Graph-Fraudster: Adversarial Attacks on Graph Neural Network Based Vertical Federated Learning arXiv 2021 Link
GraphMI: Extracting Private Graph Data from Graph Neural Networks arXiv 2021 Link
Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable Quantum Key Distribution with High Excess Noise Tolerance arXiv 2021 Link
HyObscure: Hybrid Obscuring for Privacy-Preserving Data Publishing arXiv 2021 Link
Hybrid Systems, Iterative Learning Control, and Non-minimum Phase arXiv 2021 Link
HyperGI: Automated Detection and Repair of Information Flow Leakage arXiv 2021 Link
Hyperparameter Tuning with Renyi Differential Privacy arXiv 2021 Link
IMAGINE: Image Synthesis by Image-Guided Model Inversion arXiv 2021 Link
Improve Unscented Kalman Inversion With Low-Rank Approximation and Reduced-Order Model arXiv 2021 Link
Inference Attacks Against Graph Neural Networks arXiv 2021 Link
Information Leakage in Zero-Error Source Coding: A Graph-Theoretic Perspective arXiv 2021 Link
Information Theoretic Evaluation of Privacy-Leakage, Interpretability, and Transferability for Trustworthy AI arXiv 2021 Link
Information flow based defensive chain for data leakage detection and prevention: a survey arXiv 2021 Link
Innovative Electroacoustic resonator Control enforcing Duffing dynamics at moderate excitation levels: conception and experimental validation arXiv 2021 Link
Inverse patchy colloids: synthesis, modeling and self-organization arXiv 2021 Link
Inverting brain grey matter models with likelihood-free inference: a tool for trustable cytoarchitecture measurements arXiv 2021 Link
Investigating Protected Health Information Leakage from Android Medical Applications arXiv 2021 Link
Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs arXiv 2021 Link
Large Scale Private Learning via Low-rank Reparametrization arXiv 2021 Link
Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels -- Attacks and Defenses arXiv 2021 Link
Learner-Private Convex Optimization arXiv 2021 Link
Learning Sparse Privacy-Preserving Representations for Smart Meters Data arXiv 2021 Link
Less is More: Lighter and Faster Deep Neural Architecture for Tomato Leaf Disease Classification arXiv 2021 Link
Leveraging User Behavior History for Personalized Email Search arXiv 2021 Link
Lifting The Grey Curtain: A First Look at the Ecosystem of CULPRITWARE arXiv 2021 Link
Linear Prediction Residual for Efficient Diagnosis of Parkinson's Disease from Gait arXiv 2021 Link
LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis arXiv 2021 Link
LoSAC: An Efficient Local Stochastic Average Control Method for Federated Optimization arXiv 2021 Link
Lower Bounds for the MMSE via Neural Network Estimation and Their Applications to Privacy arXiv 2021 Link
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models arXiv 2021 Link
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey arXiv 2021 Link
Machine unlearning via GAN arXiv 2021 Link
Managing dataset shift by adversarial validation for credit scoring arXiv 2021 Link
Measurement device-independent quantum key distribution with passive, time-dependent source side-channels arXiv 2021 Link
Measuring Data Leakage in Machine-Learning Models with Fisher Information arXiv 2021 Link
Measuring Information Leakage in Non-stochastic Brute-Force Guessing arXiv 2021 Link
Membership Inference Attack Susceptibility of Clinical Language Models arXiv 2021 Link
Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning arXiv 2021 Link
Membership Inference Attacks Against Recommender Systems arXiv 2021 Link
Membership Inference Attacks Against Self-supervised Speech Models arXiv 2021 Link
Membership Inference Attacks Against Temporally Correlated Data in Deep Reinforcement Learning arXiv 2021 Link
Membership Inference Attacks on Knowledge Graphs arXiv 2021 Link
Membership Inference on Word Embedding and Beyond arXiv 2021 Link
Memorization vs. Generalization: Quantifying Data Leakage in NLP Performance Evaluation arXiv 2021 Link
Minimization of information leakage in continuous-variable quantum key distribution arXiv 2021 Link
Minimizing Information Leakage of Abrupt Changes in Stochastic Systems arXiv 2021 Link
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture arXiv 2021 Link
Mitigating Power Attacks through Fine-Grained Instruction Reordering arXiv 2021 Link
MixNN: Protection of Federated Learning Against Inference Attacks by Mixing Neural Network Layers arXiv 2021 Link
MuCoMiD: A Multitask Convolutional Learning Framework for miRNA-Disease Association Prediction arXiv 2021 Link
Multi-Party Dual Learning arXiv 2021 Link
Multi-Trigger-Key: Towards Multi-Task Privacy Preserving In Deep Learning arXiv 2021 Link
Multitask Identity-Aware Image Steganography via Minimax Optimization arXiv 2021 Link
Non-autoregressive Transformer with Unified Bidirectional Decoder for Automatic Speech Recognition arXiv 2021 Link
Non-equilibrium plasma generation via nano-second multi-mode laser pulses arXiv 2021 Link
OGGN: A Novel Generalized Oracle Guided Generative Architecture for Modelling Inverse Function of Artificial Neural Networks arXiv 2021 Link
On performance of PBFT for IoT-applications with constrained devices arXiv 2021 Link
On the Importance of Encrypting Deep Features arXiv 2021 Link
On the Robustness of Vision Transformers to Adversarial Examples arXiv 2021 Link
On the differential privacy of dynamic location obfuscation with personalized error bounds arXiv 2021 Link
On the privacy-utility trade-off in differentially private hierarchical text classification arXiv 2021 Link
Optimal Rate-Distortion-Leakage Tradeoff for Single-Server Information Retrieval arXiv 2021 Link
Optimal anticodes, MSRD codes, and generalized weights in the sum-rank metric arXiv 2021 Link
P4AI: Approaching AI Ethics through Principlism arXiv 2021 Link
PASS: Protected Attribute Suppression System for Mitigating Bias in Face Recognition arXiv 2021 Link
PIVODL: Privacy-preserving vertical federated learning over distributed labels arXiv 2021 Link
PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments arXiv 2021 Link
PRECODE - A Generic Model Extension to Prevent Deep Gradient Leakage arXiv 2021 Link
Persuasion and Welfare arXiv 2021 Link
PnPOOD : Out-Of-Distribution Detection for Text Classification via Plug andPlay Data Augmentation arXiv 2021 Link
Practical Defences Against Model Inversion Attacks for Split Neural Networks arXiv 2021 Link
Preserving Privacy in Personalized Models for Distributed Mobile Services arXiv 2021 Link
Privacy Amplification for Federated Learning via User Sampling and Wireless Aggregation arXiv 2021 Link
Privacy Budget Scheduling arXiv 2021 Link
Privacy Information Classification: A Hybrid Approach arXiv 2021 Link
Privacy Leakage over Dependent Attributes in One-Sided Differential Privacy arXiv 2021 Link
Privacy Vulnerability of Split Computing to Data-Free Model Inversion Attacks arXiv 2021 Link
Privacy-Preserving Database Fingerprinting arXiv 2021 Link
Privacy-Preserving Federated Learning on Partitioned Attributes arXiv 2021 Link
Privacy-Preserving Machine Learning: Methods, Challenges and Directions arXiv 2021 Link
Privacy-Preserving Transactive Energy Management for IoT-aided Smart Homes via Blockchain arXiv 2021 Link
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies arXiv 2021 Link
Privacy-Utility Trade-Offs Against Limited Adversaries arXiv 2021 Link
Privacy-preserving Federated Learning based on Multi-key Homomorphic Encryption arXiv 2021 Link
PrivateSNN: Privacy-Preserving Spiking Neural Networks arXiv 2021 Link
Promises and Pitfalls of Black-Box Concept Learning Models arXiv 2021 Link
Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model's Complexity arXiv 2021 Link
Property Inference From Poisoning arXiv 2021 Link
Protect Against Unintentional Insider Threats: The risk of an employee's cyber misconduct on a Social Media Site arXiv 2021 Link
Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation arXiv 2021 Link
QFlow: Quantitative Information Flow for Security-Aware Hardware Design in Verilog arXiv 2021 Link
Quality of Service Guarantees for Physical Unclonable Functions arXiv 2021 Link
Quantifying and Localizing Usable Information Leakage from Neural Network Gradients arXiv 2021 Link
Quantifying identifiability to choose and audit $ε$ in differentially private deep learning arXiv 2021 Link
Quantum federated learning through blind quantum computing arXiv 2021 Link
Quantum secure direct communication with private dense coding using general preshared quantum state arXiv 2021 Link
Qubit Sensing: A New Attack Model for Multi-programming Quantum Computing arXiv 2021 Link
Random Hash Code Generation for Cancelable Fingerprint Templates using Vector Permutation and Shift-order Process arXiv 2021 Link
Random vector functional link neural network based ensemble deep learning for short-term load forecasting arXiv 2021 Link
Reconfigurable Intelligent Surface Empowered Over-the-Air Federated Edge Learning arXiv 2021 Link
Reconstructing Training Data from Diverse ML Models by Ensemble Inversion arXiv 2021 Link
Recurrent Neural Network-based Internal Model Control design for stable nonlinear systems arXiv 2021 Link
Reinforcement Learning on Encrypted Data arXiv 2021 Link
Resource Allocation for IRS-Enabled Secure Multiuser Multi-Carrier Downlink URLLC Systems arXiv 2021 Link
Revisiting Challenges for Selective Data Protection of Real Applications arXiv 2021 Link
Revizor: Testing Black-box CPUs against Speculation Contracts arXiv 2021 Link
Robot Program Parameter Inference via Differentiable Shadow Program Inversion arXiv 2021 Link
Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video arXiv 2021 Link
Robust and Information-theoretically Safe Bias Classifier against Adversarial Attacks arXiv 2021 Link
Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey arXiv 2021 Link
Round-robin differential phase-time-shifting protocol for quantum key distribution: theory and experiment arXiv 2021 Link
SASH: Efficient Secure Aggregation Based on SHPRG For Federated Learning arXiv 2021 Link
SGDE: Secure Generative Data Exchange for Cross-Silo Federated Learning arXiv 2021 Link
Secrecy: Secure collaborative analytics on secret-shared data arXiv 2021 Link
Secure Bilevel Asynchronous Vertical Federated Learning with Backward Updating arXiv 2021 Link
Secure Block Source Coding with Sequential Encoding arXiv 2021 Link
Secure Machine Learning over Relational Data arXiv 2021 Link
Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT Systems arXiv 2021 Link
Secure Multi-Party Quantum Conference and Xor Computation arXiv 2021 Link
Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning arXiv 2021 Link
Security Analysis and Improvement of Source Independent Quantum Random Number Generators with Imperfect Devices arXiv 2021 Link
Separation of Powers in Federated Learning arXiv 2021 Link
Sharing FANCI Features: A Privacy Analysis of Feature Extraction for DGA Detection arXiv 2021 Link
Simple and loss-tolerant free-space QKD using a squeezed laser arXiv 2021 Link
Smoothed Differential Privacy arXiv 2021 Link
SoK: Privacy-Preserving Collaborative Tree-based Model Learning arXiv 2021 Link
Subverting Stateful Firewalls with Protocol States (Extended Version) arXiv 2021 Link
Survey: Leakage and Privacy at Inference Time arXiv 2021 Link
TAG: Gradient Attack on Transformer-based Language Models arXiv 2021 Link
TOHAN: A One-step Approach towards Few-shot Hypothesis Adaptation arXiv 2021 Link
The Controllability of Planning, Responsibility, and Security in Automatic Driving Technology arXiv 2021 Link
The Curse of Correlations for Robust Fingerprinting of Relational Databases arXiv 2021 Link
The Image Local Autoregressive Transformer arXiv 2021 Link
The Privacy Paradox and Optimal Bias-Variance Trade-offs in Data Acquisition arXiv 2021 Link
The Stackelberg Equilibrium for One-sided Zero-sum Partially Observable Stochastic Games arXiv 2021 Link
The Surprising Performance of Simple Baselines for Misinformation Detection arXiv 2021 Link
Timing Covert Channel Analysis of the VxWorks MILS Embedded Hypervisor under the Common Criteria Security Certification arXiv 2021 Link
Towards General-purpose Infrastructure for Protecting Scientific Data Under Study arXiv 2021 Link
Towards Industrial Private AI: A two-tier framework for data and model security arXiv 2021 Link
Towards Secure and Practical Machine Learning via Secret Sharing and Random Permutation arXiv 2021 Link
Training Data Leakage Analysis in Language Models arXiv 2021 Link
UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning arXiv 2021 Link
Unbiased Statistical Estimation and Valid Confidence Intervals Under Differential Privacy arXiv 2021 Link
Understanding Training-Data Leakage from Gradients in Neural Networks for Image Classification arXiv 2021 Link
Understanding and Mitigating Banking Trojans: From Zeus to Emotet arXiv 2021 Link
Unsupervised Information Obfuscation for Split Inference of Neural Networks arXiv 2021 Link
Variational Leakage: The Role of Information Complexity in Privacy Leakage arXiv 2021 Link
Wavefront tolerances of space-based segmented telescopes at very high contrast: Experimental validation arXiv 2021 Link
Weakly Private Information Retrieval Under Rényi Divergence arXiv 2021 Link
What Remains of Visual Semantic Embeddings arXiv 2021 Link
When the Curious Abandon Honesty: Federated Learning Is Not Private arXiv 2021 Link
Wireless Charging Power Side-Channel Attacks arXiv 2021 Link
Wireless Federated Learning over MIMO Networks: Joint Device Scheduling and Beamforming Design arXiv 2021 Link
Wiretap Secret Key Agreement Via Secure Omniscience arXiv 2021 Link
Y-GAN: Learning Dual Data Representations for Efficient Anomaly Detection arXiv 2021 Link

2020

Title Venue Year Link
$μ$Tiles: Efficient Intra-Process Privilege Enforcement of Memory Regions arXiv 2020 Link
A Compiler Assisted Scheduler for Detecting and Mitigating Cache-Based Side Channel Attacks arXiv 2020 Link
A Comprehensive Analysis of Information Leakage in Deep Transfer Learning arXiv 2020 Link
A Critical Study on Data Leakage in Recommender System Offline Evaluation arXiv 2020 Link
A Framework for Evaluating Gradient Leakage Attacks in Federated Learning arXiv 2020 Link
A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment arXiv 2020 Link
A Graph Symmetrisation Bound on Channel Information Leakage under Blowfish Privacy arXiv 2020 Link
A Novel Privacy-Preserved Recommender System Framework based on Federated Learning arXiv 2020 Link
A Polynomial Interpolation based Quantum Key Reconciliation Protocol: Error Correction without Information Leakage arXiv 2020 Link
A Secure Federated Learning Framework for 5G Networks arXiv 2020 Link
A Visualization Interface to Improve the Transparency of Collected Personal Data on the Internet arXiv 2020 Link
A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems arXiv 2020 Link
A connection between bacterial chemotactic network and optimal filtering arXiv 2020 Link
Accounting for Input Noise in Gaussian Process Parameter Retrieval arXiv 2020 Link
Additively Homomorphical Encryption based Deep Neural Network for Asymmetrically Collaborative Machine Learning arXiv 2020 Link
Adversarial Data Encryption arXiv 2020 Link
Against Membership Inference Attack: Pruning is All You Need arXiv 2020 Link
Amnesiac Machine Learning arXiv 2020 Link
An Approach for the Identification of Information Leakage in Automotive Infotainment systems arXiv 2020 Link
An Efficiency-boosting Client Selection Scheme for Federated Learning with Fairness Guarantee arXiv 2020 Link
An Overview of Privacy in Machine Learning arXiv 2020 Link
Analysing Flow Security Properties in Virtualised Computing Systems arXiv 2020 Link
Anomalous waves triggered by abrupt depth changes: laboratory experiments and truncated KdV statistical mechanics arXiv 2020 Link
Another Look at Privacy-Preserving Automated Contact Tracing arXiv 2020 Link
Asymmetric Leaky Private Information Retrieval arXiv 2020 Link
Backflashes in fast-gated avalanche photodiodes in quantum key distribution arXiv 2020 Link
Bayesian model inversion using stochastic spectral embedding arXiv 2020 Link
Biometric Identification Systems With Noisy Enrollment for Gaussian Source arXiv 2020 Link
Black holes as clouded mirrors: the Hayden-Preskill protocol with symmetry arXiv 2020 Link
Black-box Model Inversion Attribute Inference Attacks on Classification Models arXiv 2020 Link
Blockchain-Empowered Socially Optimal Transactive Energy System: Framework and Implementation arXiv 2020 Link
Bounding Privacy Leakage in Smart Buildings arXiv 2020 Link
Bridging the Performance Gap between FGSM and PGD Adversarial Training arXiv 2020 Link
Building and Maintaining a Third-Party Library Supply Chain for Productive and Secure SGX Enclave Development arXiv 2020 Link
Can Two Walk Together: Privacy Enhancing Methods and Preventing Tracking of Users arXiv 2020 Link
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? arXiv 2020 Link
CenterYou: A cloud-based Approach to Simplify Android Privacy Management arXiv 2020 Link
Channel Leakage, Information-Theoretic Limitations of Obfuscation, and Optimal Privacy Mask Design for Streaming Data arXiv 2020 Link
Collusion-Resilient Probabilistic Fingerprinting Scheme for Correlated Data arXiv 2020 Link
Comment on "No-Reference Video Quality Assessment Based on the Temporal Pooling of Deep Features" arXiv 2020 Link
Communication-Efficient Federated Learning with Compensated Overlap-FedAvg arXiv 2020 Link
Communication-Efficient Multimodal Split Learning for mmWave Received Power Prediction arXiv 2020 Link
Concentrated Differentially Private and Utility Preserving Federated Learning arXiv 2020 Link
Corella: A Private Multi Server Learning Approach based on Correlated Queries arXiv 2020 Link
Correlated Data in Differential Privacy: Definition and Analysis arXiv 2020 Link
Correlated Differential Privacy: Feature Selection in Machine Learning arXiv 2020 Link
Correlated daily time series and forecasting in the M4 competition arXiv 2020 Link
Countermeasure against quantum hacking using detection statistics arXiv 2020 Link
Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks arXiv 2020 Link
Critical analysis on the reproducibility of visual quality assessment using deep features arXiv 2020 Link
Critical faults of leakage errors on the surface code arXiv 2020 Link
Cross-Layer Deanonymization Methods in the Lightning Protocol arXiv 2020 Link
DPoS: Decentralized, Privacy-Preserving, and Low-Complexity Online Slicing for Multi-Tenant Networks arXiv 2020 Link
DarKnight: A Data Privacy Scheme for Training and Inference of Deep Neural Networks arXiv 2020 Link
Data Sanitisation Protocols for the Privacy Funnel with Differential Privacy Guarantees arXiv 2020 Link
Decentralizing Feature Extraction with Quantum Convolutional Neural Network for Automatic Speech Recognition arXiv 2020 Link
Deep Importance Sampling based on Regression for Model Inversion and Emulation arXiv 2020 Link
Defending Model Inversion and Membership Inference Attacks via Prediction Purification arXiv 2020 Link
Differentially Private Online Submodular Maximization arXiv 2020 Link
Differentially Private Representation for NLP: Formal Guarantee and An Empirical Study on Privacy and Fairness arXiv 2020 Link
Direct phase modulation via optical injection: theoretical study arXiv 2020 Link
Dynamic Skyline Queries on Encrypted Data Using Result Materialization arXiv 2020 Link
Dynamic causal modelling of COVID-19 arXiv 2020 Link
Erratum Concerning the Obfuscated Gradients Attack on Stochastic Activation Pruning arXiv 2020 Link
Estimating g-Leakage via Machine Learning arXiv 2020 Link
Estimating required 'lockdown' cycles before immunity to SARS-CoV-2: Model-based analyses of susceptible population sizes, 'S0', in seven European countries including the UK and Ireland arXiv 2020 Link
Evaluation of Inference Attack Models for Deep Learning on Medical Data arXiv 2020 Link
FaceLeaks: Inference Attacks against Transfer Learning Models via Black-box Queries arXiv 2020 Link
Fault Attacks on Secure Embedded Software: Threats, Design and Evaluation arXiv 2020 Link
Fault Tolerant Control of Multirotor UAV for Piloted Outdoor Flights arXiv 2020 Link
Fault tolerant quantum data locking arXiv 2020 Link
Feature Inference Attack on Model Predictions in Vertical Federated Learning arXiv 2020 Link
FedSel: Federated SGD under Local Differential Privacy with Top-k Dimension Selection arXiv 2020 Link
Federated Learning for Resource-Constrained IoT Devices: Panoramas and State-of-the-art arXiv 2020 Link
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning arXiv 2020 Link
Free Gap Estimates from the Exponential Mechanism, Sparse Vector, Noisy Max and Related Algorithms arXiv 2020 Link
Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval arXiv 2020 Link
Giving Semantics to Program-Counter Labels via Secure Effects arXiv 2020 Link
Green Lighting ML: Confidentiality, Integrity, and Availability of Machine Learning Systems in Deployment arXiv 2020 Link
Guidelines for Implementing and Auditing Differentially Private Systems arXiv 2020 Link
Harnessing Wireless Channels for Scalable and Privacy-Preserving Federated Learning arXiv 2020 Link
Hermes Attack: Steal DNN Models with Lossless Inference Accuracy arXiv 2020 Link
High-resolution spectroscopy of a surge in an emerging flux region arXiv 2020 Link
How Does Data Augmentation Affect Privacy in Machine Learning? arXiv 2020 Link
How to 0wn NAS in Your Spare Time arXiv 2020 Link
IRO: Integrity and Reliability Enhanced Ring ORAM arXiv 2020 Link
Image Restoration from Parametric Transformations using Generative Models arXiv 2020 Link
Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection arXiv 2020 Link
Improving Robustness to Model Inversion Attacks via Mutual Information Regularization arXiv 2020 Link
Improving the Security of "Measurement-Device-Independent Quantum Communication without Encryption" arXiv 2020 Link
Information Laundering for Model Privacy arXiv 2020 Link
Information Leakage Games: Exploring Information as a Utility Function arXiv 2020 Link
Information Leakage in Embedding Models arXiv 2020 Link
Information Obfuscation of Graph Neural Networks arXiv 2020 Link
Information-Theoretic Bounds on the Generalization Error and Privacy Leakage in Federated Learning arXiv 2020 Link
KART: Parameterization of Privacy Leakage Scenarios from Pre-trained Language Models arXiv 2020 Link
Knowledge-Enriched Distributional Model Inversion Attacks arXiv 2020 Link
Label-Only Membership Inference Attacks arXiv 2020 Link
Latent-variable Private Information Retrieval arXiv 2020 Link
Layer-wise Characterization of Latent Information Leakage in Federated Learning arXiv 2020 Link
Leakage detection for a transmon-based surface code arXiv 2020 Link
Leaking Sensitive Financial Accounting Data in Plain Sight using Deep Autoencoder Neural Networks arXiv 2020 Link
Learning for Advanced Motion Control arXiv 2020 Link
Learning to drive via Apprenticeship Learning and Deep Reinforcement Learning arXiv 2020 Link
Learning, compression, and leakage: Minimising classification error via meta-universal compression principles arXiv 2020 Link
Legal Risks of Adversarial Machine Learning Research arXiv 2020 Link
LiteDenseNet: A Lightweight Network for Hyperspectral Image Classification arXiv 2020 Link
MGA: Momentum Gradient Attack on Network arXiv 2020 Link
Machine Learning Interpretability Meets TLS Fingerprinting arXiv 2020 Link
Measurement-Device-Independent Quantum Key Distribution with Leaky Sources arXiv 2020 Link
Measuring Information Leakage in Non-stochastic Brute-Force Guessing arXiv 2020 Link
Mechanisms for Hiding Sensitive Genotypes with Information-Theoretic Privacy arXiv 2020 Link
MixCon: Adjusting the Separability of Data Representations for Harder Data Recovery arXiv 2020 Link
Modelling and Quantifying Membership Information Leakage in Machine Learning arXiv 2020 Link
Monte Carlo Estimators for the Schatten p-norm of Symmetric Positive Semidefinite Matrices arXiv 2020 Link
Multi-Entity and Multi-Enrollment Key Agreement with Correlated Noise arXiv 2020 Link
Multi-Server Weakly-Private Information Retrieval arXiv 2020 Link
Multiple Classification with Split Learning arXiv 2020 Link
Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks arXiv 2020 Link
NoPeek: Information leakage reduction to share activations in distributed deep learning arXiv 2020 Link
On Primes, Log-Loss Scores and (No) Privacy arXiv 2020 Link
On Properties and Optimization of Information-theoretic Privacy Watchdog arXiv 2020 Link
On the Effectiveness of Regularization Against Membership Inference Attacks arXiv 2020 Link
On the Information Leakage of Camera Fingerprint Estimates arXiv 2020 Link
On the Privacy Risks of Algorithmic Fairness arXiv 2020 Link
Opacity of Discrete Event Systems with Active Intruder arXiv 2020 Link
Optimizing Resource-Efficiency for Federated Edge Intelligence in IoT Networks arXiv 2020 Link
Over-the-Air Membership Inference Attacks as Privacy Threats for Deep Learning-based Wireless Signal Classifiers arXiv 2020 Link
PASCAL: Timing SCA Resistant Design and Verification Flow arXiv 2020 Link
PROSPECT-PRO for estimating content of nitrogen-containing leaf proteins and other carbon-based constituents arXiv 2020 Link
Parametric Instance Classification for Unsupervised Visual Feature Learning arXiv 2020 Link
Performance Optimization on Practical Quantum Random Number Generators: Modification on Min-entropy Evaluation and Acceleration on Post Processing arXiv 2020 Link
Personalized Federated Learning for Intelligent IoT Applications: A Cloud-Edge based Framework arXiv 2020 Link
Politics of Adversarial Machine Learning arXiv 2020 Link
Practical Privacy Attacks on Vertical Federated Learning arXiv 2020 Link
Preference-Based Privacy Trading arXiv 2020 Link
Prevention of Microarchitectural Covert Channels on an Open-Source 64-bit RISC-V Core arXiv 2020 Link
Prioritized Multi-Criteria Federated Learning arXiv 2020 Link
PrivNet: Safeguarding Private Attributes in Transfer Learning for Recommendation arXiv 2020 Link
Privacy Guidelines for Contact Tracing Applications arXiv 2020 Link
Privacy Leakage of SIFT Features via Deep Generative Model based Image Reconstruction arXiv 2020 Link
Privacy Preservation in Federated Learning: An insightful survey from the GDPR Perspective arXiv 2020 Link
Privacy Preserving Visual SLAM arXiv 2020 Link
Privacy Preserving in Non-Intrusive Load Monitoring: A Differential Privacy Perspective arXiv 2020 Link
Privacy Protection via Joint Real and Reactive Load Shaping in Smart Grids arXiv 2020 Link
Privacy-Aware Time-Series Data Sharing with Deep Reinforcement Learning arXiv 2020 Link
Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms arXiv 2020 Link
Privacy-Preserving Distributed Projection LMS for Linear Multitask Networks arXiv 2020 Link
Privacy-Preserving Distributed Zeroth-Order Optimization arXiv 2020 Link
Privacy-Preserving Dynamic Personalized Pricing with Demand Learning arXiv 2020 Link
Privacy-Preserving Policy Synthesis in Markov Decision Processes arXiv 2020 Link
Privacy-aware Data Trading arXiv 2020 Link
Privacy-preserving Decentralized Aggregation for Federated Learning arXiv 2020 Link
Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata arXiv 2020 Link
Privacy-preserving Transfer Learning via Secure Maximum Mean Discrepancy arXiv 2020 Link
Privacy-preserving medical image analysis arXiv 2020 Link
Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis arXiv 2020 Link
Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective arXiv 2020 Link
Quantifying Membership Privacy via Information Leakage arXiv 2020 Link
Quantifying Privacy Leakage in Graph Embedding arXiv 2020 Link
R-GAP: Recursive Gradient Attack on Privacy arXiv 2020 Link
RDP-GAN: A Rényi-Differential Privacy based Generative Adversarial Network arXiv 2020 Link
Realistic Re-evaluation of Knowledge Graph Completion Methods: An Experimental Study arXiv 2020 Link
Reducing Risk of Model Inversion Using Privacy-Guided Training arXiv 2020 Link
Reduction Theorem for Secrecy over Linear Network Code for Active Attacks arXiv 2020 Link
Resilient Collaborative Privacy for Location-Based Services arXiv 2020 Link
Resilient Privacy Protection for Location-Based Services through Decentralization arXiv 2020 Link
Resource Allocation for Secure Multi-User Downlink MISO-URLLC Systems arXiv 2020 Link
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions arXiv 2020 Link
Robust Privatization with Multiple Tasks and the Optimal Privacy-Utility Tradeoff arXiv 2020 Link
RobustBench: a standardized adversarial robustness benchmark arXiv 2020 Link
SIMF: Single-Instruction Multiple-Flush Mechanism for Processor Temporal Isolation arXiv 2020 Link
SMAP: A Joint Dimensionality Reduction Scheme for Secure Multi-Party Visualization arXiv 2020 Link
SPChain: Blockchain-based Medical Data Sharing and Privacy-preserving eHealth System arXiv 2020 Link
STAN: Synthetic Network Traffic Generation with Generative Neural Models arXiv 2020 Link
Sanitizing Synthetic Training Data Generation for Question Answering over Knowledge Graphs arXiv 2020 Link
SecEL: Privacy-Preserving, Verifiable and Fault-Tolerant Edge Learning for Autonomous Vehicles arXiv 2020 Link
Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary arXiv 2020 Link
Secure Non-Orthogonal Multiple Access: An Interference Engineering Perspective arXiv 2020 Link
Secure Simultaneous Information and Power Transfer for Downlink Multi-user Massive MIMO arXiv 2020 Link
Secure and Fault Tolerant Decentralized Learning arXiv 2020 Link
Secure and Reliable Key Agreement with Physical Unclonable Functions arXiv 2020 Link
Secure network code over one-hop relay network arXiv 2020 Link
Semantic, Efficient, and Secure Search over Encrypted Cloud Data arXiv 2020 Link
SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images arXiv 2020 Link
Stratified cross-validation for unbiased and privacy-preserving federated learning arXiv 2020 Link
Strong Secrecy for General Multiple-Access Wiretap Channels arXiv 2020 Link
Stronger and Faster Wasserstein Adversarial Attacks arXiv 2020 Link
Subverting Privacy-Preserving GANs: Hiding Secrets in Sanitized Images arXiv 2020 Link
TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems arXiv 2020 Link
The Capacity of Single-Server Weakly-Private Information Retrieval arXiv 2020 Link
The Privacy Funnel from the viewpoint of Local Differential Privacy arXiv 2020 Link
This Face Does Not Exist ... But It Might Be Yours! Identity Leakage in Generative Models arXiv 2020 Link
Toward Efficient Quantum Key Distribution Reconciliation arXiv 2020 Link
Towards Gender-Neutral Face Descriptors for Mitigating Bias in Face Recognition arXiv 2020 Link
Trading Data For Learning: Incentive Mechanism For On-Device Federated Learning arXiv 2020 Link
TrappeD: DRAM Trojan Designs for Information Leakage and Fault Injection Attacks arXiv 2020 Link
Two Efficient Measurement Device Independent Quantum Dialogue Protocols arXiv 2020 Link
Two-timescale Beamforming Optimization for Intelligent Reflecting Surface Aided Multiuser Communication with QoS Constraints arXiv 2020 Link
Unexpected Information Leakage of Differential Privacy Due to Linear Property of Queries arXiv 2020 Link
Unsupervised Anomaly Detection From Semantic Similarity Scores arXiv 2020 Link
VerifyTL: Secure and Verifiable Collaborative Transfer Learning arXiv 2020 Link
Vertically Federated Graph Neural Network for Privacy-Preserving Node Classification arXiv 2020 Link
WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity arXiv 2020 Link
When Federated Learning Meets Blockchain: A New Distributed Learning Paradigm arXiv 2020 Link
When Machine Unlearning Jeopardizes Privacy arXiv 2020 Link
Wireless Federated Learning with Local Differential Privacy arXiv 2020 Link

2019

Title Venue Year Link
("Oops! Had the silly thing in reverse")---Optical injection attacks in through LED status indicators arXiv 2019 Link
A First Look at References from the Dark to Surface Web World arXiv 2019 Link
A Submodularity-based Agglomerative Clustering Algorithm for the Privacy Funnel arXiv 2019 Link
AI slipping on tiles: data leakage in digital pathology arXiv 2019 Link
Adaptive Regularization Parameter Choice Rules for Large-Scale Problems arXiv 2019 Link
Adversarial Learning of Privacy-Preserving and Task-Oriented Representations arXiv 2019 Link
Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment arXiv 2019 Link
An Optimal Stable Selective Model Inversion for Nonminimum-phase Systems arXiv 2019 Link
Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes arXiv 2019 Link
Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach arXiv 2019 Link
Analyzing Information Leakage of Updates to Natural Language Models arXiv 2019 Link
Application Inference using Machine Learning based Side Channel Analysis arXiv 2019 Link
Approximate Bayesian Model Inversion for PDEs with Heterogeneous and State-Dependent Coefficients arXiv 2019 Link
Attack Trees for Security and Privacy in Social Virtual Reality Learning Environments arXiv 2019 Link
AuditShare: Sensitive Data Sharing with Reliable Leaker Identification arXiv 2019 Link
BAYHENN: Combining Bayesian Deep Learning and Homomorphic Encryption for Secure DNN Inference arXiv 2019 Link
Bayesian fusion and multimodal DCM for EEG and fMRI arXiv 2019 Link
Bounding light source side channels in QKD via Hong-Ou-Mandel interference arXiv 2019 Link
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs arXiv 2019 Link
Can We Prove Time Protection? arXiv 2019 Link
Characterizing Membership Privacy in Stochastic Gradient Langevin Dynamics arXiv 2019 Link
Cloud model inversions of strong chromospheric absorption lines using principal component analysis arXiv 2019 Link
Continuous variable controlled quantum dialogue and secure multiparty quantum computation arXiv 2019 Link
Controllable Planning, Responsibility, and Information in Automatic Driving Technology arXiv 2019 Link
Controller-independent bidirectional quantum direct communication arXiv 2019 Link
Convolutional Neural Networks for Classification of Alzheimer's Disease: Overview and Reproducible Evaluation arXiv 2019 Link
Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer arXiv 2019 Link
Cryptanalysis and improvement of several quantum private comparison protocols arXiv 2019 Link
Detecting Fault Injection Attacks with Runtime Verification arXiv 2019 Link
Developing Non-Stochastic Privacy-Preserving Policies Using Agglomerative Clustering arXiv 2019 Link
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference arXiv 2019 Link
Differential privacy with partial knowledge arXiv 2019 Link
Differentially Private ADMM for Distributed Medical Machine Learning arXiv 2019 Link
Differentially Private Link Prediction With Protected Connections arXiv 2019 Link
Differentially Private Model Publishing for Deep Learning arXiv 2019 Link
Differentially Private Survival Function Estimation arXiv 2019 Link
Disorder-induced Enhancement of Entanglement Growth in One Dimension: Information Leakage at the scale of localization length arXiv 2019 Link
Distortion Estimation Through Explicit Modeling of the Refractive Surface arXiv 2019 Link
Estimating Numerical Distributions under Local Differential Privacy arXiv 2019 Link
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme arXiv 2019 Link
Federated Generative Privacy arXiv 2019 Link
Federated Learning with Differential Privacy: Algorithms and Performance Analysis arXiv 2019 Link
Fixed Region Beamforming using Frequency Diverse Subarray for Secure Mmwave Wireless Communications arXiv 2019 Link
Fundamental Limits of Identification System With Secret Binding Under Noisy Enrollment arXiv 2019 Link
Future Data Helps Training: Modeling Future Contexts for Session-based Recommendation arXiv 2019 Link
GAMIN: An Adversarial Approach to Black-Box Model Inversion arXiv 2019 Link
Generalization in Generative Adversarial Networks: A Novel Perspective from Privacy Protection arXiv 2019 Link
How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning arXiv 2019 Link
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks arXiv 2019 Link
Identification, Secrecy, Template, and Privacy-Leakage of Biometric Identification System Under Noisy Enrollment arXiv 2019 Link
Image Decomposition and Classification through a Generative Model arXiv 2019 Link
Improving Small-Scale CMB Lensing Reconstruction arXiv 2019 Link
Improving the performance of Twin-Field Quantum Key Distribution arXiv 2019 Link
Incremental Adaptive Attack Synthesis arXiv 2019 Link
InfoRest: Restricting Privacy Leakage to Online Social Network App arXiv 2019 Link
Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses arXiv 2019 Link
Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks arXiv 2019 Link
KLEESPECTRE: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution arXiv 2019 Link
Learning Privately over Distributed Features: An ADMM Sharing Approach arXiv 2019 Link
Learning to Prevent Leakage: Privacy-Preserving Inference in the Mobile Cloud arXiv 2019 Link
Lightning-Fast and Privacy-Preserving Outsourced Computation in the Cloud arXiv 2019 Link
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting arXiv 2019 Link
Maximal Information Leakage based Privacy Preserving Data Disclosure Mechanisms arXiv 2019 Link
Membership Model Inversion Attacks for Deep Networks arXiv 2019 Link
Minimizing the Information Leakage Regarding High-Level Task Specifications arXiv 2019 Link
Mitigating Information Leakage in Image Representations: A Maximum Entropy Approach arXiv 2019 Link
Model Inversion Networks for Model-Based Optimization arXiv 2019 Link
MuonTrap: Preventing Cross-Domain Spectre-Like Attacks by Capturing Speculative State arXiv 2019 Link
Noiseless Privacy arXiv 2019 Link
Novelty Messages Filtering for Multi Agent Privacy-preserving Planning arXiv 2019 Link
On Safeguarding Privacy and Security in the Framework of Federated Learning arXiv 2019 Link
On the Compositionality of Dynamic Leakage and Its Application to the Quantification Problem arXiv 2019 Link
On the Information Leakage in Private Information Retrieval Systems arXiv 2019 Link
On the Risk of Cancelable Biometrics arXiv 2019 Link
On the Secrecy Performance and Power Allocation in Relaying Networks with Untrusted Relay in the Partial Secrecy Regime arXiv 2019 Link
P3SGD: Patient Privacy Preserving SGD for Regularizing Deep CNNs in Pathological Image Classification arXiv 2019 Link
PAGURUS: Low-Overhead Dynamic Information Flow Tracking on Loosely Coupled Accelerators arXiv 2019 Link
PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance arXiv 2019 Link
PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos arXiv 2019 Link
Parametric Timed Model Checking for Guaranteeing Timed Opacity arXiv 2019 Link
Pentest on an Internet Mobile App: A Case Study using Tramonto arXiv 2019 Link
Physical Layer Secret Key Generation in Static Environments arXiv 2019 Link
Privacy Against Brute-Force Inference Attacks arXiv 2019 Link
Privacy Leakage Avoidance with Switching Ensembles arXiv 2019 Link
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study arXiv 2019 Link
Privacy Risks of Securing Machine Learning Models against Adversarial Examples arXiv 2019 Link
Privacy-Aware Location Sharing with Deep Reinforcement Learning arXiv 2019 Link
Privacy-cost trade-off in a smart meter system with a renewable energy source and a rechargeable battery arXiv 2019 Link
Private Authentication with Physical Identifiers Through Broadcast Channel Measurements arXiv 2019 Link
Privately detecting changes in unknown distributions arXiv 2019 Link
Proof of Federated Learning: A Novel Energy-recycling Consensus Algorithm arXiv 2019 Link
Protecting Spatiotemporal Event Privacy in Continuous Location-Based Services arXiv 2019 Link
Quantifying (Hyper) Parameter Leakage in Machine Learning arXiv 2019 Link
Quantifying Dynamic Leakage: Complexity Analysis and Model Counting-based Calculation arXiv 2019 Link
Quantifying information flow in interactive systems arXiv 2019 Link
Quantifying the Privacy Risks of Learning High-Dimensional Graphical Models arXiv 2019 Link
RNN-T For Latency Controlled ASR With Improved Beam Search arXiv 2019 Link
Reconstruction and Membership Inference Attacks against Generative Models arXiv 2019 Link
Robust and Secure Wireless Communications via Intelligent Reflecting Surfaces arXiv 2019 Link
Robust or Private? Adversarial Training Makes Models More Vulnerable to Privacy Attacks arXiv 2019 Link
Robustness of Low-Complexity Massive MIMO Architectures Against Passive Eavesdropping arXiv 2019 Link
Robustness of Maximal $α$-Leakage to Side Information arXiv 2019 Link
SAFECHAIN: Securing Trigger-Action Programming from Attack Chains (Extended Technical Report) arXiv 2019 Link
Secrecy and Covert Communications against UAV Surveillance via Multi-Hop Networks arXiv 2019 Link
Secure Distribution of Protected Content in Information-Centric Networking arXiv 2019 Link
Secure Regularized Zero Forcing for Multiuser MIMOME Channels arXiv 2019 Link
SecureBoost: A Lossless Federated Learning Framework arXiv 2019 Link
SecureGBM: Secure Multi-Party Gradient Boosting arXiv 2019 Link
SoK: Chasing Accuracy and Privacy, and Catching Both in Differentially Private Histogram Publication arXiv 2019 Link
SvTPM: A Secure and Efficient vTPM in the Cloud arXiv 2019 Link
The Arrival of News and Return Jumps in Stock Markets: A Nonparametric Approach arXiv 2019 Link
The Conditional Information Leakage Given Eavesdropper's Received Signals in Wiretap Channels arXiv 2019 Link
The Dirichlet Mechanism for Differential Privacy on the Unit Simplex arXiv 2019 Link
The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks arXiv 2019 Link
The importance of evaluating the complete automated knowledge-based planning pipeline arXiv 2019 Link
Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks arXiv 2019 Link
Time-aware Gradient Attack on Dynamic Network Link Prediction arXiv 2019 Link
To the numerical solution of the inverse multi-frequency scalar acoustics problem arXiv 2019 Link
Towards Distributed Privacy-Preserving Prediction arXiv 2019 Link
Towards Security Threats of Deep Learning Systems: A Survey arXiv 2019 Link
Towards a Better Indicator for Cache Timing Channels arXiv 2019 Link
Tracking sex: The implications of widespread sexual data leakage and tracking on porn websites arXiv 2019 Link
Trade-offs and Guarantees of Adversarial Representation Learning for Information Obfuscation arXiv 2019 Link
Universal Mutual Information Privacy Guarantees for Smart Meters arXiv 2019 Link
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning arXiv 2019 Link
Upper Bound of Collective Attacks on Quantum Key Distribution arXiv 2019 Link
VideoDP: A Universal Platform for Video Analytics with Differential Privacy arXiv 2019 Link
ZETH: On Integrating Zerocash on Ethereum arXiv 2019 Link
ZombieLoad: Cross-Privilege-Boundary Data Sampling arXiv 2019 Link
ct-fuzz: Fuzzing for Timing Leaks arXiv 2019 Link

2018

Title Venue Year Link
A Blockchain-based Flight Data Recorder for Cloud Accountability arXiv 2018 Link
A Cascaded Convolutional Neural Network for Single Image Dehazing arXiv 2018 Link
A Game-Theoretic Approach to Information-Flow Control via Protocol Composition arXiv 2018 Link
A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem arXiv 2018 Link
A Hybrid Artificial-Noise and Secret-Key Scheme for Securing OFDM Transmissions in V2G Networks arXiv 2018 Link
A Tunable Measure for Information Leakage arXiv 2018 Link
A novel hybrid score level and decision level fusion scheme for cancelable multi-biometric verification arXiv 2018 Link
Adversarial Texts with Gradient Methods arXiv 2018 Link
Algorithms that Remember: Model Inversion Attacks and Data Protection Law arXiv 2018 Link
An Algebraic Approach for Reasoning About Information Flow arXiv 2018 Link
An Operational Approach to Information Leakage arXiv 2018 Link
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices arXiv 2018 Link
Anonymous Single-Sign-On for n designated services with traceability arXiv 2018 Link
Artificial Impostors for Location Privacy Preservation arXiv 2018 Link
Asymmetric response to PMI announcements in China's stock returns arXiv 2018 Link
BPDS: A Blockchain based Privacy-Preserving Data Sharing for Electronic Medical Records arXiv 2018 Link
Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning arXiv 2018 Link
Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator arXiv 2018 Link
Capstone: Mobility Modeling on Smartphones to Achieve Privacy by Design arXiv 2018 Link
Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach arXiv 2018 Link
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning arXiv 2018 Link
Confidential Inference via Ternary Model Partitioning arXiv 2018 Link
Content-Based Multi-Source Encrypted Image Retrieval in Clouds with Privacy Preservation arXiv 2018 Link
Contextual Bandits with Stochastic Experts arXiv 2018 Link
Controllable Identifier Measurements for Private Authentication with Secret Keys arXiv 2018 Link
Crashing Privacy: An Autopsy of a Web Browser's Leaked Crash Reports arXiv 2018 Link
Cryptanalysis of a One-Time Code-Based Digital Signature Scheme arXiv 2018 Link
Data Synthesis based on Generative Adversarial Networks arXiv 2018 Link
Deanonymizing Tor hidden service users through Bitcoin transactions analysis arXiv 2018 Link
Decoy-state quantum key distribution with a leaky source arXiv 2018 Link
Detecting Data Leakage from Databases on Android Apps with Concept Drift arXiv 2018 Link
Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory arXiv 2018 Link
Development of probabilistic dam breach model using Bayesian inference arXiv 2018 Link
Differentially Private Data Generative Models arXiv 2018 Link
Differentially Private User-based Collaborative Filtering Recommendation Based on K-means Clustering arXiv 2018 Link
DroidMark: A Tool for Android Malware Detection using Taint Analysis and Bayesian Network arXiv 2018 Link
EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing arXiv 2018 Link
Eavesdropping and countermeasures for backflash side channel in quantum cryptography arXiv 2018 Link
Efficient treatment of model discrepancy by Gaussian Processes - Importance for imbalanced multiple constraint inversions arXiv 2018 Link
Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing arXiv 2018 Link
Exploiting Data Sensitivity on Partitioned Data arXiv 2018 Link
False-Accept/False-Reject Trade-offs in Biometric Authentication Systems arXiv 2018 Link
Fast Gradient Attack on Network Embedding arXiv 2018 Link
Finite-key security analysis for quantum key distribution with leaky sources arXiv 2018 Link
Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints arXiv 2018 Link
HASP: A High-Performance Adaptive Mobile Security Enhancement Against Malicious Speech Recognition arXiv 2018 Link
High Dimensional Model Representation as a Glass Box in Supervised Machine Learning arXiv 2018 Link
How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering? arXiv 2018 Link
Hybrid Statistical Estimation of Mutual Information and its Application to Information Flow arXiv 2018 Link
I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators arXiv 2018 Link
Ice state evolution during spring in Richardson crater, Mars arXiv 2018 Link
LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT arXiv 2018 Link
Law and Adversarial Machine Learning arXiv 2018 Link
Lclean: A Plausible Approach to Individual Trajectory Data Sanitization arXiv 2018 Link
Leakage and Protocol Composition in a Game-Theoretic Perspective arXiv 2018 Link
Light Ears: Information Leakage via Smart Lights arXiv 2018 Link
Link Prediction Adversarial Attack arXiv 2018 Link
Local Obfuscation Mechanisms for Hiding Probability Distributions arXiv 2018 Link
Location Privacy in Cognitive Radio Networks: A Survey arXiv 2018 Link
Low Latency Privacy Preserving Inference arXiv 2018 Link
Meltdown arXiv 2018 Link
MicroWalk: A Framework for Finding Side Channels in Binaries arXiv 2018 Link
Multiple Antennas Secure Transmission under Pilot Spoofing and Jamming Attack arXiv 2018 Link
No Peek: A Survey of private distributed deep learning arXiv 2018 Link
On Robustness of Massive MIMO Systems Against Passive Eavesdropping under Antenna Selection arXiv 2018 Link
On Secure Transmission Design: An Information Leakage Perspective arXiv 2018 Link
On the Robustness of Information-Theoretic Privacy Measures and Mechanisms arXiv 2018 Link
On the Security Analysis of a Cooperative Incremental Relaying Protocol in the Presence of an Active Eavesdropper arXiv 2018 Link
On the Security of an Unconditionally Secure, Universally Composable Inner Product Protocol arXiv 2018 Link
Optimal Accuracy-Privacy Trade-Off for Secure Multi-Party Computations arXiv 2018 Link
Optimal Utility-Privacy Trade-off with Total Variation Distance as a Privacy Measure arXiv 2018 Link
Peek-a-Boo: I see your smart home activities, even encrypted! arXiv 2018 Link
Practical Decentralized Attribute-Based Delegation using Secure Name Systems arXiv 2018 Link
Preserving Both Privacy and Utility in Network Trace Anonymization arXiv 2018 Link
Privacy Leakages in Approximate Adders arXiv 2018 Link
Privacy Under Hard Distortion Constraints arXiv 2018 Link
Privacy against a Hypothesis Testing Adversary arXiv 2018 Link
Privacy in Social Media: Identification, Mitigation and Applications arXiv 2018 Link
Privacy-Preserving Collaborative Deep Learning with Unreliable Participants arXiv 2018 Link
Privacy-Protective-GAN for Face De-identification arXiv 2018 Link
Privacy-preserving Machine Learning through Data Obfuscation arXiv 2018 Link
Privacy-preserving Sensory Data Recovery arXiv 2018 Link
Privacy-preserving Stochastic Gradual Learning arXiv 2018 Link
Privacy-preserving smart meter control strategy including energy storage losses arXiv 2018 Link
Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks (Extended Version) arXiv 2018 Link
Processor Hardware Security Vulnerabilities and their Detection by Unique Program Execution Checking arXiv 2018 Link
Quantum Network Code for Multiple-Unicast Network with Quantum Invertible Linear Operations arXiv 2018 Link
Reducing Metadata Leakage from Encrypted Files and Communication with PURBs arXiv 2018 Link
Refined security proof of the round-robin differential phase shift quantum key distribution and its improved performance in the finite-sized case arXiv 2018 Link
Research on the Security of Blockchain Data: A Survey arXiv 2018 Link
Round-Robin Differential Phase-Shift Quantum Key Distribution with Twisted Photons arXiv 2018 Link
S-RL Toolbox: Environments, Datasets and Evaluation Metrics for State Representation Learning arXiv 2018 Link
Secrecy Amplification for Distributed Encrypted Sources with Correlated Keys using Affine Encoders arXiv 2018 Link
Secure Face Matching Using Fully Homomorphic Encryption arXiv 2018 Link
Secure Modulo Sum via Multiple Access Channel arXiv 2018 Link
Securing OFDM-Based Wireless Links Using Temporal Artificial-Noise Injection arXiv 2018 Link
Security and Privacy Issues in Deep Learning arXiv 2018 Link
Self-Stabilizing and Private Distributed Shared Atomic Memory in Seldomly Fair Message Passing Networks arXiv 2018 Link
Semantic Security via Seeded Modular Coding Schemes and Ramanujan Graphs arXiv 2018 Link
Severity Level of Permissions in Role-Based Access Control arXiv 2018 Link
Solving DWF Dirac Equation Using Multisplitting Preconditioned Conjugate Gradient arXiv 2018 Link
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem arXiv 2018 Link
The Trusted Server: A secure computational environment for privacy compliant evaluations on plain personal data arXiv 2018 Link
The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures arXiv 2018 Link
Thinging Machine applied to Information Leakage arXiv 2018 Link
Time Protection: the Missing OS Abstraction arXiv 2018 Link
Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs arXiv 2018 Link
Uniqueness and direct imaging method for inverse scattering by locally rough surfaces with phaseless near-field data arXiv 2018 Link
Validating Hyperspectral Image Segmentation arXiv 2018 Link
What's the Over/Under? Probabilistic Bounds on Information Leakage arXiv 2018 Link
ZebraLancer: Decentralized Crowdsourcing of Human Knowledge atop Open Blockchain arXiv 2018 Link

2017

Title Venue Year Link
A Covert Queueing Channel in FCFS Schedulers arXiv 2017 Link
A Covert Queueing Channel in Round Robin Schedulers arXiv 2017 Link
A Permission-Dependent Type System for Secure Information Flow Analysis arXiv 2017 Link
A semi-parametric estimation for max-mixture spatial processes arXiv 2017 Link
Achieving Dalenius' Goal of Data Privacy with Practical Assumptions arXiv 2017 Link
An HMM-based Multi-sensor Approach for Continuous Mobile Authentication arXiv 2017 Link
Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS) arXiv 2017 Link
Applications of Economic and Pricing Models for Wireless Network Security: A Survey arXiv 2017 Link
Approximate Quantum Error Correction Revisited: Introducing the Alpha-bit arXiv 2017 Link
Bandwidth-efficient Storage Services for Mitigating Side Channel Attack arXiv 2017 Link
Chlorine and Bromine Isotope Fractionation of Halogenated Organic Pollutants on Gas Chromatography Columns arXiv 2017 Link
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems arXiv 2017 Link
Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory arXiv 2017 Link
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning arXiv 2017 Link
Differentially Private Neighborhood-based Recommender Systems arXiv 2017 Link
Distributed Differential Privacy By Sampling arXiv 2017 Link
Efficient Privacy Preserving Viola-Jones Type Object Detection via Random Base Image Representation arXiv 2017 Link
Emerging Privacy Issues and Solutions in Cyber-Enabled Sharing Services: From Multiple Perspectives arXiv 2017 Link
Families of Quantum Fingerprinting Protocols arXiv 2017 Link
Fast amortized inference of neural activity from calcium imaging data with variational autoencoders arXiv 2017 Link
Guidelines for Artificial Intelligence Containment arXiv 2017 Link
Hybrid Procoder and Combiner Design for Secure Transmission in mmWave MIMO Systems arXiv 2017 Link
Identifying Best Interventions through Online Importance Sampling arXiv 2017 Link
Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification arXiv 2017 Link
Information Leakage Games arXiv 2017 Link
Information-Theoretic Privacy with General Distortion Constraints arXiv 2017 Link
Iterative Machine Learning for Output Tracking arXiv 2017 Link
Joint secrecy over the K-Transmitter Multiple Access Channel arXiv 2017 Link
LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications arXiv 2017 Link
Lighting Two Candles With One Flame: An Unaided Human Identification Protocol With Security Beyond Conventional Limit arXiv 2017 Link
Measurement Device Independent Quantum Dialogue arXiv 2017 Link
Measuring Information Leakage in Website Fingerprinting Attacks and Defenses arXiv 2017 Link
Navigating dark liquidity (How Fisher catches Poisson in the Dark) arXiv 2017 Link
Order-Preserving Encryption Using Approximate Integer Common Divisors arXiv 2017 Link
Parallel Device-Independent Quantum Key Distribution arXiv 2017 Link
Privacy Preserving and Collusion Resistant Energy Sharing arXiv 2017 Link
Privacy-Preserving Economic Dispatch in Competitive Electricity Market arXiv 2017 Link
Privacy-Utility Tradeoffs under Constrained Data Release Mechanisms arXiv 2017 Link
PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage arXiv 2017 Link
Private Data System Enabling Self-Sovereign Storage Managed by Executable Choreographies arXiv 2017 Link
Quantifying Differential Privacy in Continuous Data Release under Temporal Correlations arXiv 2017 Link
Re-DPoctor: Real-time health data releasing with w-day differential privacy arXiv 2017 Link
Reconstructing Small Scale Lenses from the Cosmic Microwave Background Temperature Fluctuations arXiv 2017 Link
Refinement-based Specification and Security Analysis of Separation Kernels arXiv 2017 Link
Resource Allocation for Secure Full-Duplex OFDMA Radio Systems arXiv 2017 Link
Rethinking Split Manufacturing: An Information-Theoretic Approach with Secure Layout Techniques arXiv 2017 Link
Robust and Secure Resource Allocation for Full-Duplex MISO Multicarrier NOMA Systems arXiv 2017 Link
Round-robin-differential-phase-shift quantum key distribution with and without monitoring signal disturbance arXiv 2017 Link
Sampling High Throughput Data for Anomaly Detection of Data-Base Activity arXiv 2017 Link
Secrecy and Robustness for Active Attack in Secure Network Coding and its Application to Network Quantum Key Distribution arXiv 2017 Link
Secure Beamforming in Full-Duplex SWIPT Systems arXiv 2017 Link
Secure two-way communication via a wireless powered untrusted relay and friendly jammer arXiv 2017 Link
Securing Databases from Probabilistic Inference arXiv 2017 Link
Smart Meter Privacy via the Trapdoor Channel arXiv 2017 Link
Smart Meter Privacy with Renewable Energy and an Energy Storage Device arXiv 2017 Link
Software Grand Exposure: SGX Cache Attacks Are Practical arXiv 2017 Link
Tensor Decompositions for Modeling Inverse Dynamics arXiv 2017 Link
The VACCINE Framework for Building DLP Systems arXiv 2017 Link
Types for Location and Data Security in Cloud Environments arXiv 2017 Link
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be arXiv 2017 Link
What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy arXiv 2017 Link
Widths of regular and context-free languages arXiv 2017 Link

2016

Title Venue Year Link
A Cross-Platform Collection of Social Network Profiles arXiv 2016 Link
AntMonitor: A System for On-Device Mobile Network Monitoring and its Applications arXiv 2016 Link
Backflash light characterization to prevent QKD zero-error hacking arXiv 2016 Link
EMFS: Repurposing SMTP and IMAP for Data Storage and Synchronization arXiv 2016 Link
Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors arXiv 2016 Link
FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping arXiv 2016 Link
Generalized rank weights of reducible codes, optimal cases and related properties arXiv 2016 Link
Information Security as Strategic (In)effectivity arXiv 2016 Link
Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires arXiv 2016 Link
Long-Term Growth Rate of Expected Utility for Leveraged ETFs: Martingale Extraction Approach arXiv 2016 Link
Maximum likelihood estimates of pairwise rearrangement distances arXiv 2016 Link
Multiphoton controllable transport between remote resonators arXiv 2016 Link
OSSINT - Open Source Social Network Intelligence An efficient and effective way to uncover "private" information in OSN profiles arXiv 2016 Link
On Secrecy Metrics for Physical Layer Security over Quasi-Static Fading Channels arXiv 2016 Link
Performance of Lattice Coset Codes on Universal Software Radio Peripherals arXiv 2016 Link
Personal Information Leakage During Password Recovery of Internet Services arXiv 2016 Link
Pilot Contamination Attack Detection by Key-Confirmation in Secure MIMO Systems arXiv 2016 Link
Preventing side-channel effects in continuous-variable quantum key distribution arXiv 2016 Link
Privacy Leakage through Innocent Content Sharing in Online Social Networks arXiv 2016 Link
Privacy, Secrecy, and Storage with Multiple Noisy Measurements of Identifiers arXiv 2016 Link
Privacy-Constrained Remote Source Coding arXiv 2016 Link
Privacy-Protecting Energy Management Unit through Model-Distribution Predictive Control arXiv 2016 Link
Quantifying Differential Privacy under Temporal Correlations arXiv 2016 Link
Quantum Advantage on Information Leakage for Equality arXiv 2016 Link
Ripple: Reflection Analysis for Android Apps in Incomplete Information Environments arXiv 2016 Link
Robust Privacy-Utility Tradeoffs under Differential Privacy and Hamming Distortion arXiv 2016 Link
SICS: Secure In-Cloud Service Function Chaining arXiv 2016 Link
Secure Group Testing arXiv 2016 Link
Smart Meter Privacy with Renewable Energy and a Finite Capacity Battery arXiv 2016 Link
Stealing PINs via Mobile Sensors: Actual Risk versus User Perception arXiv 2016 Link
Strong Secrecy for Cooperative Broadcast Channels arXiv 2016 Link
The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps arXiv 2016 Link
Virtualization Technology: Cross-VM Cache Side Channel Attacks make it Vulnerable arXiv 2016 Link
Well-Rounded Lattices: Towards Optimal Coset Codes for Gaussian and Fading Wiretap Channels arXiv 2016 Link
Wiretap Channels with Random States Non-Causally Available at the Encoder arXiv 2016 Link

2015

Title Venue Year Link
A New Covert Channel over Cellular Voice Channel in Smartphones arXiv 2015 Link
A New Storage Optimized Honeyword Generation Approach for Enhancing Security and Usability arXiv 2015 Link
A regularizing iterative ensemble Kalman method for PDE-constrained inverse problems arXiv 2015 Link
Active Eavesdropping via Spoofing Relay Attack arXiv 2015 Link
Authenticated Semi-quantum Direct Communication Protocols using Bell States arXiv 2015 Link
Broadcast Channels with Privacy Leakage Constraints arXiv 2015 Link
Classifying Unrooted Gaussian Trees under Privacy Constraints arXiv 2015 Link
Communication and Randomness Lower Bounds for Secure Computation arXiv 2015 Link
CrowdSurf: Empowering Informed Choices in the Web arXiv 2015 Link
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks arXiv 2015 Link
Danger is My Middle Name: Experimenting with SSL Vulnerabilities in Android Apps arXiv 2015 Link
Dark-Pool Perspective of Optimal Market Making arXiv 2015 Link
Detection of Information leakage in cloud arXiv 2015 Link
Deterministically Deterring Timing Attacks in Deterland arXiv 2015 Link
Experimental Passive Round-Robin Differential Phase-Shift Quantum Key Distribution arXiv 2015 Link
Experimental demonstration of quantum key distribution without monitoring of the signal disturbance arXiv 2015 Link
Graph Watermarks arXiv 2015 Link
Individual Secrecy for the Broadcast Channel arXiv 2015 Link
Individual secrecy for broadcast channels with receiver side information arXiv 2015 Link
Information Leakage of Heterogeneous Encoded Correlated Sequences over Eavesdropped Channel arXiv 2015 Link
Information-Theoretic Privacy for Smart Metering Systems with a Rechargeable Battery arXiv 2015 Link
LinkMirage: How to Anonymize Links in Dynamic Social Systems arXiv 2015 Link
Networks, Dynamic Factors, and the Volatility Analysis of High-Dimensional Financial Series arXiv 2015 Link
Notes on Information-Theoretic Privacy arXiv 2015 Link
On asymptotically good ramp secret sharing schemes arXiv 2015 Link
On the Interference Alignment Designs for Secure Multiuser MIMO Systems arXiv 2015 Link
On the similarities between generalized rank and Hamming weights and their applications to network coding arXiv 2015 Link
Physical Layer Security in Massive MIMO arXiv 2015 Link
Polynomial model inversion control: numerical tests and applications arXiv 2015 Link
Practical round-robin differential-phase-shift quantum key distribution arXiv 2015 Link
Practical security bounds against the Trojan-horse attack in quantum key distribution arXiv 2015 Link
Private Date Exposure in Facebook and the Impact of Comprehensible Audience Selection Controls arXiv 2015 Link
Quantitative Information Flow for Scheduler-Dependent Systems arXiv 2015 Link
Quantitative information flow under generic leakage functions and adaptive adversaries arXiv 2015 Link
Radial abundance gradients from planetary nebulae at different distances from the galactic plane arXiv 2015 Link
Reasoning About Information Flow Security of Separation Kernels with Channel-based Communication arXiv 2015 Link
Relative Generalized Hamming Weights of Cyclic Codes arXiv 2015 Link
Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences arXiv 2015 Link
Secret Key Agreement with Large Antenna Arrays under the Pilot Contamination Attack arXiv 2015 Link
Secret key-based Identification and Authentication with a Privacy Constraint arXiv 2015 Link
Security Games with Information Leakage: Modeling and Computation arXiv 2015 Link
Smart Meter Privacy with an Energy Harvesting Device and Instantaneous Power Constraints arXiv 2015 Link
Timeability of Extensive-Form Games arXiv 2015 Link
Toward Practical Differential Privacy in Smart Grid with Capacity-Limited Rechargeable Batteries arXiv 2015 Link
Universal Anomaly Detection: Algorithms and Applications arXiv 2015 Link

2014

Title Venue Year Link
A Distributed Framework for Scalable Search over Encrypted Documents arXiv 2014 Link
A New Approach for Finding Cloned Profiles in Online Social Networks arXiv 2014 Link
Algebraic double cut and join -- A group-theoretic approach to the operator on multichromosomal genomes arXiv 2014 Link
An Empirical Study on Android for Saving Non-shared Data on Public Storage arXiv 2014 Link
Certifying and removing disparate impact arXiv 2014 Link
Characterization and suppression techniques for degree of radiation damping in inversion recovery measurements arXiv 2014 Link
Complete elimination of information leakage in continuous-variable quantum communication channels arXiv 2014 Link
Compressing Encrypted Data and Permutation Cipher arXiv 2014 Link
Control of nonlinear systems: a model inversion approach arXiv 2014 Link
Enable Portrait Privacy Protection in Photo Capturing and Sharing arXiv 2014 Link
Experimental Passive Decoy-State Quantum Key Distribution arXiv 2014 Link
From the Information Bottleneck to the Privacy Funnel arXiv 2014 Link
Fundamental Finite Key Limits for One-Way Information Reconciliation in Quantum Key Distribution arXiv 2014 Link
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats arXiv 2014 Link
Improved 3-Dimensional Security in Cloud Computing arXiv 2014 Link
Improved depth imaging by constrained full-waveform inversion arXiv 2014 Link
Information Leakage of Correlated Source Coded Sequences over Channel with an Eavesdropper arXiv 2014 Link
Managing your Private and Public Data: Bringing down Inference Attacks against your Privacy arXiv 2014 Link
Mitigating information leakage in a crowded spectrum of weakly anharmonic qubits arXiv 2014 Link
PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices arXiv 2014 Link
Privacy Games: Optimal User-Centric Data Obfuscation arXiv 2014 Link
Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics arXiv 2014 Link
Quantifying the Information Leakage in Timing Side Channels in Deterministic Work-Conserving Schedulers arXiv 2014 Link
Rank-Based Inference over Web Databases arXiv 2014 Link
Relative generalized Hamming weights of q-ary Reed-Muller codes arXiv 2014 Link
Securing Cloud from Cloud Drain arXiv 2014 Link
Smart Meter Privacy for Multiple Users in the Presence of an Alternative Energy Source arXiv 2014 Link
Splitting and Matrix Exponential approach for jump-diffusion models with Inverse Normal Gaussian, Hyperbolic and Meixner jumps arXiv 2014 Link
The Application of Differential Privacy for Rank Aggregation: Privacy and Accuracy arXiv 2014 Link
The Conceptual Idea of Online Social Media Site (SMS) User Account Penetration Testing System arXiv 2014 Link

2013

Title Venue Year Link
A Case of Collusion: A Study of the Interface Between Ad Libraries and their Apps arXiv 2013 Link
A New Approach to Decoding of Rational Irreducible Goppa code arXiv 2013 Link
Abundance gradients in spiral disks: is the gradient inversion at high redshift real? arXiv 2013 Link
An Information Theoretic Study of Timing Side Channels in Two-user Schedulers arXiv 2013 Link
Behavior-Based online Incentive Mechanism for Crowd Sensing with Budget Constraints arXiv 2013 Link
CUDA Leaks: Information Leakage in GPU Architectures arXiv 2013 Link
Content-based data leakage detection using extended fingerprinting arXiv 2013 Link
Determination of the pion distribution amplitude arXiv 2013 Link
Entangled state engineering of vibrational modes in a multi-membrane optomechanical system arXiv 2013 Link
Fundamental Limits of Caching with Secure Delivery arXiv 2013 Link
Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers arXiv 2013 Link
Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices arXiv 2013 Link
Measuring Privacy Leakage for IDS Rules arXiv 2013 Link
Mitigating Timing Side Channel in Shared Schedulers arXiv 2013 Link
Modulus Computational Entropy arXiv 2013 Link
On Secure Source Coding with Side Information at the Encoder arXiv 2013 Link
Quantum Cryptography Using Various Reversible Quantum Logic Gates in WSNs arXiv 2013 Link
Robust quantum data locking from phase modulation arXiv 2013 Link
Secrecy Capacity Scaling in Large Cooperative Wireless Networks arXiv 2013 Link
Secure Degrees of Freedom of the Gaussian Wiretap Channel with Helpers and No Eavesdropper CSI: Blind Cooperative Jamming arXiv 2013 Link
Secure Source Coding with a Public Helper arXiv 2013 Link
Signature Generation for Sensitive Information Leakage in Android Applications arXiv 2013 Link
SilentSense: Silent User Identification via Dynamics of Touch and Movement Behavioral Biometrics arXiv 2013 Link
Velocity estimation via registration-guided least-squares inversion arXiv 2013 Link

2012

Title Venue Year Link
Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and Approximation arXiv 2012 Link
Auditing for Distributed Storage Systems arXiv 2012 Link
Covariate assisted screening and estimation arXiv 2012 Link
Efficient Superimposition Recovering Algorithm arXiv 2012 Link
Information Leakage Neutralization for the Multi-Antenna Non-Regenerative Relay-Assisted Multi-Carrier Interference Channel arXiv 2012 Link
Plugging Side-Channel Leaks with Timing Information Flow Control arXiv 2012 Link
Privacy Against Statistical Inference arXiv 2012 Link
Secure Cooperative Regenerating Codes for Distributed Storage Systems arXiv 2012 Link
Semantically Secure Lattice Codes for the Gaussian Wiretap Channel arXiv 2012 Link
Shortest Path Computation with No Information Leakage arXiv 2012 Link
Spatially resolved X-ray spectroscopy and modeling of the nonthermal emission of the PWN in G0.9+0.1 arXiv 2012 Link
The formation of planets in circumbinary disks arXiv 2012 Link

2011

Title Venue Year Link
A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security arXiv 2011 Link
A Theoretical Analysis of Authentication, Privacy and Reusability Across Secure Biometric Systems arXiv 2011 Link
Anthropic versus cosmological solutions to the coincidence problem arXiv 2011 Link
Conditioning bounds for traveltime tomography in layered media arXiv 2011 Link
Control of Wireless Networks with Secrecy arXiv 2011 Link
Cryptovirology: Virus Approach arXiv 2011 Link
Differential Privacy: on the trade-off between Utility and Information Leakage arXiv 2011 Link
Formal Verification of Differential Privacy for Interactive Systems arXiv 2011 Link
Formal approaches to information hiding: An analysis of interactive systems, statistical disclosure control, and refinement of specifications arXiv 2011 Link
Hidden-Markov Program Algebra with iteration arXiv 2011 Link
On fuzzy syndrome hashing with LDPC coding arXiv 2011 Link
Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems arXiv 2011 Link
Squeezed-state quantum key distribution upon imperfect reconciliation arXiv 2011 Link
The Sender-Excited Secret Key Agreement Model: Capacity, Reliability and Secrecy Exponents arXiv 2011 Link

2010

Title Venue Year Link
A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations arXiv 2010 Link
A generalized mean field theory of coarse-graining arXiv 2010 Link
Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation arXiv 2010 Link
Compromising Tor Anonymity Exploiting P2P Information Leakage arXiv 2010 Link
Differential Privacy versus Quantitative Information Flow arXiv 2010 Link
Double-pass variants for multi-shift BiCGstab(ell) arXiv 2010 Link
Information Reconciliation for Quantum Key Distribution arXiv 2010 Link
Magnetic dynamics driven by the spin-current generated via spin-Seebeck effect arXiv 2010 Link
Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies arXiv 2010 Link
Photon level crosstalk between parallel fibers installed in urban area arXiv 2010 Link
Protection of Web Applications from Cross-Site Scripting Attacks in Browser Side arXiv 2010 Link
Quantifying Information Leakage in Finite Order Deterministic Programs arXiv 2010 Link
Realization of Quantum State Privacy Amplification in a Nuclear Magnetic Resonance Quantum System arXiv 2010 Link
Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information? arXiv 2010 Link
What are suspicious VoIP delays? arXiv 2010 Link

2009

Title Venue Year Link
Dynamics of a many-particle Landau-Zener model: inverse sweep arXiv 2009 Link
Performance of Quantum Key Distribution Protocol with Dual-Rail Displaced Photon States arXiv 2009 Link
Secure Source Coding with a Helper arXiv 2009 Link
Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions arXiv 2009 Link
The cannonball model of long GRBs - overview arXiv 2009 Link
Transmitting an analog Gaussian source over a Gaussian wiretap channel under SNR mismatch arXiv 2009 Link

2008

Title Venue Year Link
Inverse decays and the relic density of the sterile sneutrino arXiv 2008 Link

2007

Title Venue Year Link
Chromospheric Cloud-Model Inversion Techniques arXiv 2007 Link
DPA on quasi delay insensitive asynchronous circuits: formalization and improvement arXiv 2007 Link

2005

Title Venue Year Link
Formation of Galactic Systems in Light of the Magnesium Abundance in Field Stars: The Thick Disk arXiv 2005 Link
Phase Transitions Patterns in Relativistic and Nonrelativistic Multi-Scalar-Field Models arXiv 2005 Link
Stable Fermion Bag Solitons in the Massive Gross-Neveu Model: Inverse Scattering Analysis arXiv 2005 Link

2004

Title Venue Year Link
Quantum privacy amplification for quantum secure direct communication arXiv 2004 Link

2003

Title Venue Year Link
Optimum Probe Parameters for Entangling Probe in Quantum Key Distribution arXiv 2003 Link

2001

Title Venue Year Link
Chemical bonding, elasticity, and valence force field models: a case study for alpha-Pt_2Si and PtSi arXiv 2001 Link
On quantum and approximate privacy arXiv 2001 Link
Scale Invariant Markov Models for Bayesian Inversion of Linear Inverse Problems arXiv 2001 Link
Search for the Lepton Number Violating Process nu_mu-bar e^- -> mu^- nu_e-bar arXiv 2001 Link

1999

Title Venue Year Link
An Exactly Soluble Hierarchical Clustering Model: Inverse Cascades, Self-Similarity, and Scaling arXiv 1999 Link
Quantum Key Distribution using Two Coherent States of Light and their Superposition arXiv 1999 Link