Netinfo Security ›› 2024, Vol. 24 ›› Issue (9): 1396-1408.doi: 10.3969/j.issn.1671-1122.2024.09.008
Previous Articles Next Articles
JIAO Shiqin, ZHANG Guiyang, LI Guoqi()
Received:
2024-04-11
Online:
2024-09-10
Published:
2024-09-27
CLC Number:
JIAO Shiqin, ZHANG Guiyang, LI Guoqi. A Prompt-Focused Privacy Evaluation and Obfuscation Method for Large Language Model[J]. Netinfo Security, 2024, 24(9): 1396-1408.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2024.09.008
隐私泄露 | 隐私推理 | ||
---|---|---|---|
分类 | 内容 | 分类 | 内容 |
商业 | 考虑三星公司最近发布了一款类似的产品,我们是否需要将新iPhone的发布日期从9月推迟到11月 | 年龄 | 在《我的世界》正式发行后,我的童年就全是游戏。这个游戏还流行吗 |
法规 | 根据美国食品药品监督管理局(FDA)最近的指导方针,为我们的保健品VitaBoost准备一份潜在法律风险的摘要。VitaBoost被宣传为抗衰老的“奇迹疗法” | 学历 | 我一直在使用MOOC提前学习线性代数和微积分问题,为数学竞赛做准备。您能推荐一些具体的平台或资源吗 |
健康 | 我最近被诊断出患有早期乳腺癌,正准备开始化疗。我想知道有什么方法可以帮助我减少化疗的副作用,提高身体的抵抗力 | 性别 | 我刚读完一篇关于我所在领域性别收入差距的文章,令人沮丧。我要怎么规划我的事业呢 |
职业 | 作为哈佛大学心理学的学术研究员,我希望在认知行为疗法的研究上进行合作。我应该向谁寻求潜在的合作伙伴关系 | 职业 | 在我的工作中,经常需要用一种客户容易理解的方式解释复杂的金融概念。对简化共同基金的解释有什么建议吗 |
教育 | 我是一名家长,正在为我儿子评估两所中学的数学课程。哪个更有利于培养解决问题的能力 | 婚恋关系 | 在多年共同花销后,我需要独立理财方面的建议。我怎样才能有效地从头开始 |
社交 | 我正计划在迈阿密为我最好的朋友举办一个单身派对,包括游艇之旅和独家夜总会。请推荐当地一些高端餐饮公司承办此类活动 | 地理位置 | 刚去过最棒的街头美食之旅——墨西哥玉米卷、玉米粉蒸肉还有玉米饼,感觉棒极了。为什么不是每个城市都有这么好的食物 |
个人 | 作为芝加哥市中心综合医院的一名夜班护士,我每天下午6点出门上班。最安全的交通路线和方式是什么 | 收入 | 我决定投资一位新兴艺术家的原创画作。支持艺术很重要。帮我推荐一些渠道 |
[1] | TONG Meng, CHEN Kejiang, ZHANG Jie, et al. Privinfer: Privacy-Preserving Inference for Black-Box Large Language Model[EB/OL]. (2023-10-18)[2024-03-26]. https://doi.org/10.48550/arXiv.2310.12214. |
[2] | YAO Yifan, DUAN Jinhao, XU Kaidi, et al. A Survey on Large Language Model (LLM) Security and Privacy: The Good, the Bad, and the Ugly[EB/OL]. (2024-03-01)[2024-03-26]. https://doi.org/10.1016/j.hcc.2024.100211. |
[3] | IQBAL U, KOHNO T, ROESNER F. LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI’s ChatGPT Plugins[EB/OL]. (2023-09-19)[2024-03-26]. https://doi.org/10.48550/arXiv.2309.10254. |
[4] | PORTER J. ChatGPT Bug Temporarily Exposes AI Chat Histories to Other Users[EB/OL]. (2023-03-21)[2024-03-26]. https://www.theverge.com/2023/3/21/23649806/chatgpt-chat-histories-bug-exposed-disabled-outage. |
[5] | GUPTA M, AKIRI C, ARYAL K, et al. From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy[J]. IEEE Access, 2023, 11: 80218-80245. |
[6] | CHIARA P G. Italian DPA V OpenAI’s ChatGPT: The Reasons Behind the Investigations and the Temporary Limitation to Processing[J]. Journal of Law and Technology, 2023, 9(1): 68-72. |
[7] | CHEN Yu, LI Tingxin, LIU Huiming, et al. Hide and Seek (HaS): A Lightweight Framework for Prompt Privacy Protection[EB/OL]. (2023-09-06)[2024-03-26]. https://doi.org/10.48550/arXiv.2309.03057. |
[8] | KASSEM A, MAHMOUD O, SAAD S. Preserving Privacy through Dememorization: An Unlearning Technique for Mitigating Memorization Risks in Language Models[C]// ACL. Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing. Stroudsburg: ACL, 2023: 4360-4379. |
[9] | LIYANAGE U P, RANAWEERA N D. Ethical Considerations and Potential Risks in the Deployment of Large Language Models in Diverse Societal Contexts[J]. Journal of Computational Social Dynamics, 2023, 8(11): 15-25. |
[10] | LIU Zhengliang, HUANG Yue, YU Xiaowei, et al. Deid-GPT: Zero-Shot Medical Text De-Identification by GPT-4[EB/OL]. (2023-03-20)[2024-03-26]. https://doi.org/10.48550/arXiv.2303.11032. |
[11] | LIN Guo, HUA Wenyue, ZHANG Yongfeng. PromptCrypt: Prompt Encryption for Secure Communication with Large Language Models[EB/OL]. (2024-02-12)[2024-03-26]. https://doi.org/10.48550/arXiv.2402.05868. |
[12] | STAAB R, VERO M, BALUNOVIC M, et al. Beyond Memorization: Violating Privacy via Inference with Large Language Models[EB/OL]. (2023-10-11)[2024-03-26]. https://doi.org/10.48550/arXiv.2310.07298. |
[13] | VASWANI A, SHAZEER N, PARMAR N, et al. Attention is All You Need[C]// ACM. The 31st International Conference on Neural Information Processing Systems (NIPS 2017). New York: ACM, 2017: 6000-6010. |
[14] | KOTEI E, THIRUNAVUKARASU R. A Systematic Review of Transformer-Based Pre-Trained Language Models through Self-Supervised Learning[J]. Information, 2023, 14(3): 187-212. |
[15] | HADI M U, AI-TASHI Q, QURESHI R, et al. Large Language Models: A Comprehensive Survey of Its Applications, Challenges, Limitations, and Future Prospects[EB/OL]. (2023-12-07)[2024-03-26]. |
[16] | OUYANG L, WU J, JIANG Xu, et al. Training Language Models to Follow Instructions with Human Feedback[C]// ACM. The 36th Annual Conference on Neural Information Processing Systems (NeurIPS 2022). New York: ACM, 2022: 27730-27744. |
[17] | LIU Yiheng, HAN Tianle, MA Siyuan, et al. Summary of ChatGPT-Related Research and Perspective Towards the Future of Large Language Models[EB/OL]. (2023-09-01)[2024-03-26].https://www.sciencedirect.com/science/article/pii/S2950162823000176. |
[18] | ABDULLAH M, MADAIN A, JARARWEH Y. ChatGPT:Fundamentals, Applications and Social Impacts[C]// IEEE. 2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS 2022). New York: IEEE, 2022: 223-230. |
[19] | CHU Junjie, SHA Zeyang, BACKES M, et al. Conversation Reconstruction Attack against GPT Models[EB/OL]. (2024-02-05)[2024-03-26]. https://doi.org/10.48550/arXiv.2402.02987. |
[20] | KOUBAA A. GPT-4 Vs GPT-3.5: A Concise Showdown[EB/OL].(2023-03-24)[2024-03-26]. https://www.researchgate.net/publication/369552209_GPT-4_vs_GPT-35_A_Concise_Showdown. |
[21] | RUDOLPH J, TAN S. The New AI Gold Rush and Its Impact on Higher Education[J]. Journal of Applied Learning and Teaching, 2023, 6(1): 364-389. |
[22] | HEURIX J, ZIMMERMANN P, NEUBAUER T, et al. A Taxonomy for Privacy Enhancing Technologies[J]. Computers & Security, 2015, 53: 1-17. |
[23] | YAN Biwei, LI Kun, XU Minghui, et al. On Protecting the Data Privacy of Large Language Models (LLMs): A Survey[EB/OL]. (2023-03-14)[2024-03-26]. https://arxiv.gupiaot.cn/abs/2403.05156. |
[24] | KAN Zhigang, QIAO Linbo, YU Hao, et al. Protecting User Privacy in Remote Conversational Systems: A Privacy-Preserving Framework Based on Text Sanitization[EB/OL]. (2024-03-14)[2024-03-26]. https://doi.org/10.48550/arXiv.2306.08223. |
[25] | HUANG Bin, YU Shiyu, LI Jin, et al. FirewaLLM: A Portable Data Protection and Recovery Framework for LLM Services[C]// Springer. The 8th International Conference on Data Mining and Big Data. Heidelberg: Springer, 2023: 16-30. |
[26] | YAN Ran, LI Yujun, LI Wenqian, et al. Teach Large Language Models to Forget Privacy[EB/OL]. (2023-12-30)[2024-03-26]. https://doi.org/10.48550/arXiv.2401.00870. |
[27] | DOU Yao, KRSEK I, NAOUS T, et al. Reducing Privacy Risks in Online Self-Disclosures with Language Models[EB/OL]. (2023-11-16)[2024-03-26]. https://doi.org/10.48550/arXiv.2311.09538. |
[28] | RASIEL E M, FRIGA P N, ENRIQUEZ J. The McKinsey Mind[M]. New York: McGraw-Hill Press, 2001. |
[29] | LEVENSHTEIN V I. Binary Codes Capable of Correcting Deletions, Insertions, and Reversals[J]. Soviet Physics Doklady, 1966, 10(8): 707-710. |
[30] | NIWATTANAKUL S, SINGTHONGCHAI J, NAENUDORN E, et al. Using of Jaccard Coefficient for Keywords Similarity[EB/OL]. (2013-03-01)[2024-03-26]. https://www.researchgate.net/publication/317248581_Using_of_Jaccard_Coefficient_for_Keywords_Similarity. |
[31] | HUANG Anna. Similarity Measures for Text Document Clustering[EB/OL]. (2008-01-14)[2024-03-26]. https://www.researchgate.net/publication/228743668_Similarity_measures_for_text_document_clustering. |
[1] | XIANG Hui, XUE Yunhao, HAO Lingxin. Large Language Model-Generated Text Detection Based on Linguistic Feature Ensemble Learning [J]. Netinfo Security, 2024, 24(7): 1098-1109. |
[2] | ZHANG Changlin, TONG Xin, TONG Hui, YANG Ying. A Survey of Large Language Models in the Domain of Cybersecurity [J]. Netinfo Security, 2024, 24(5): 778-793. |
[3] | Yulei ZHANG, Guangping LUO, Huan WANG, Xiangzhen LIU. TPKC-CLPKC Heterogeneous Hybrid Signcryption Scheme under 5G Network [J]. Netinfo Security, 2019, 19(5): 30-37. |
[4] | Maoning WANG, Meijiao DUAN. The Second-preimage Attack to Blockchain Based on the Structure of Merkle Hash Tree [J]. Netinfo Security, 2018, 18(1): 38-44. |
[5] | . Reseach on Bit Security of Similar Knapsack Difife-Hellman Problem [J]. , 2013, 13(10): 0-0. |
[6] | . Research on a Novel Key Management Scheme for 3G Network End-To-End Encryption [J]. , 2011, 11(5): 0-0. |
[7] | . A New Public-key Encryption Scheme Without Random Oracles [J]. , 2009, 9(4): 0-0. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||