Security and privacy challenges of large language models: A survey

BC Das, MH Amini, Y Wu - ACM Computing Surveys, 2025 - dl.acm.org
Large language models (LLMs) have demonstrated extraordinary capabilities and
contributed to multiple fields, such as generating and summarizing text, language …

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

MA Ferrag, L Maglaras, A Argyriou, D Kosmanos… - Journal of Network and …, 2018 - Elsevier
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …

Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models

A Salem, Y Zhang, M Humbert, P Berrang… - arxiv preprint arxiv …, 2018 - arxiv.org
Machine learning (ML) has become a core component of many real-world applications and
training data is a key factor that drives current progress. This huge success has led Internet …

{ABY2. 0}: Improved {Mixed-Protocol} secure {Two-Party} computation

A Patra, T Schneider, A Suresh, H Yalame - 30th USENIX Security …, 2021 - usenix.org
Secure Multi-party Computation (MPC) allows a set of mutually distrusting parties to jointly
evaluate a function on their private inputs while maintaining input privacy. In this work, we …

Beyond surveillance: privacy, ethics, and regulations in face recognition technology

X Wang, YC Wu, M Zhou, H Fu - Frontiers in big data, 2024 - frontiersin.org
Facial recognition technology (FRT) has emerged as a powerful tool for public governance
and security, but its rapid adoption has also raised significant concerns about privacy, civil …

Dimensions of artificial intelligence anxiety based on the integrated fear acquisition theory

J Li, JS Huang - Technology in Society, 2020 - Elsevier
With the rapid development of artificial intelligence (AI), AI anxiety has emerged and is
receiving widespread attention, but research on this topic is not comprehensive. Therefore …

Chameleon: A hybrid secure computation framework for machine learning applications

MS Riazi, C Weinert, O Tkachenko… - Proceedings of the …, 2018 - dl.acm.org
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function
evaluation (SFE) which enables two parties to jointly compute a function without disclosing …

[PDF][PDF] ABY-A framework for efficient mixed-protocol secure two-party computation.

D Demmler, T Schneider, M Zohner - NDSS, 2015 - encrypto.de
Secure computation enables mutually distrusting parties to jointly evaluate a function on
their private inputs without revealing anything but the function's output. Generic secure …

Machine learning classification over encrypted data

R Bost, RA Popa, S Tu, S Goldwasser - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Abstract Machine learning classification is used in numerous settings nowadays, such as
medical or genomics predictions, spam detection, face recognition, and financial predictions …

Privacy-preserving outsourced classification in cloud computing

P Li, J Li, Z Huang, CZ Gao, WB Chen, K Chen - Cluster Computing, 2018 - Springer
Classifier has been widely applied in machine learning, such as pattern recognition, medical
diagnosis, credit scoring, banking and weather prediction. Because of the limited local …