<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="brief-report" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Commun. Netw.</journal-id>
<journal-title>Frontiers in Communications and Networks</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Commun. Netw.</abbrev-journal-title>
<issn pub-type="epub">2673-530X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">1600750</article-id>
<article-id pub-id-type="doi">10.3389/frcmn.2025.1600750</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Communications and Networks</subject>
<subj-group>
<subject>Perspective</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Privacy considerations for LLMs and other AI models: an input and output privacy approach</article-title>
<alt-title alt-title-type="left-running-head">Nie et al.</alt-title>
<alt-title alt-title-type="right-running-head">
<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/frcmn.2025.1600750">10.3389/frcmn.2025.1600750</ext-link>
</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Nie</surname>
<given-names>Zixin</given-names>
</name>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/2900511/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/formal-analysis/"/>
<role content-type="https://credit.niso.org/contributor-roles/investigation/"/>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/project-administration/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Dave</surname>
<given-names>Leena</given-names>
</name>
<uri xlink:href="https://loop.frontiersin.org/people/2901699/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/funding-acquisition/"/>
<role content-type="https://credit.niso.org/contributor-roles/supervision/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Lewis</surname>
<given-names>Rashonda</given-names>
</name>
<uri xlink:href="https://loop.frontiersin.org/people/2901462/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
</contrib-group>
<aff>
<institution>Center for Data Modernization Solutions, RTI International</institution>, <addr-line>Durham</addr-line>, <addr-line>NC</addr-line>, <country>United States</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1717859/overview">Zhiyuan Tan</ext-link>, Edinburgh Napier University, United Kingdom</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1034373/overview">Elia Onofri</ext-link>, National Research Council (CNR), Italy</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Zixin Nie, <email>zixinnie@rti.org</email>
</corresp>
</author-notes>
<pub-date pub-type="epub">
<day>10</day>
<month>09</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="collection">
<year>2025</year>
</pub-date>
<volume>6</volume>
<elocation-id>1600750</elocation-id>
<history>
<date date-type="received">
<day>02</day>
<month>04</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>19</day>
<month>08</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2025 Nie, Dave and Lewis.</copyright-statement>
<copyright-year>2025</copyright-year>
<copyright-holder>Nie, Dave and Lewis</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>The framework of Input and Output Privacy aids in conceptualization of data privacy protections, providing considerations for situations where multiple parties are collaborating in a compute system (Input Privacy) as well as considerations when releasing data from a compute process (Output Privacy). Similar frameworks for conceptualization of privacy protections at a systems design level are lacking within the Artificial Intelligence space, which can lead to mischaracterizations and incorrect implementations of privacy protections. In this paper, we apply the Input and Output Privacy framework to Artificial Intelligence (AI) systems, establishing parallels between traditional data systems and newer AI systems to help privacy professionals and AI developers and deployers conceptualize and determine the places in those systems where privacy protections have the greatest effect. We discuss why the Input and Output Privacy framework is useful when evaluating privacy protections for AI systems, examine the similarities and differences of Input and Output privacy between traditional data systems and AI systems, and provide considerations on how to protect Input and Output Privacy for systems utilizing AI models. This framework offers developers and deployers of AI systems common ground for conceptualizing where and how privacy protections can be applied in their systems and for minimizing risk of misaligned implementations of privacy protection.</p>
</abstract>
<kwd-group>
<kwd>input privacy</kwd>
<kwd>output privacy</kwd>
<kwd>large language models</kwd>
<kwd>artificial intelligence</kwd>
<kwd>privacy framework</kwd>
<kwd>privacy enhancing technologies</kwd>
</kwd-group>
<counts>
<page-count count="7"/>
</counts>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Security, Privacy and Authentication</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>Input and Output Privacy is a framework utilized by data privacy professionals to systematically design privacy protections for systems that contain, utilize, and report personal identifying information (PII), that is, all information that can be linked to an identifiable person. Input Privacy protects individual privacy when multiple parties are collaborating in computation and analyses, enabling them to share data and perform analyses without sharing private information (<xref ref-type="bibr" rid="B36">Ricciato et al., 2020</xref>; <xref ref-type="bibr" rid="B40">Stutz, 2021</xref>; <xref ref-type="bibr" rid="B41">The United Nations, 2023</xref>). Protection of Input Privacy typically involves using Privacy Enhancing Technologies (PETs) such as Homomorphic Encryption and Secure Multi Party Computation to obfuscate data so that it is unreadable to humans when conducting the computation, and afterwards providing human-readable results computed from all parties&#x2019; data (<xref ref-type="bibr" rid="B41">The United Nations, 2023</xref>; <xref ref-type="bibr" rid="B30">Nie et al., 2024</xref>; <xref ref-type="bibr" rid="B3">Archer et al., 2021</xref>; <xref ref-type="bibr" rid="B37">Santos and Zanussi, 2022</xref>). Output Privacy protects individual privacy when releasing data to other parties or to the public by using statistical methods and applying transformations to the data such as noise addition, reducing granularity, suppression of certain records or fields, or generation of synthetic data, resulting in datasets that are human and machine readable and have the risk of identifying data subjects reduced to beneath an acceptable threshold (<xref ref-type="bibr" rid="B30">Nie et al., 2024</xref>; <xref ref-type="bibr" rid="B1">10 Misunderstandings Related to Anonymisation, 2023</xref>; <xref ref-type="bibr" rid="B18">Emam, 2013</xref>; <xref ref-type="bibr" rid="B19">Giomi et al., 2022</xref>; <xref ref-type="bibr" rid="B9">Barrientos et al., 2023</xref>; <xref ref-type="bibr" rid="B16">Dwork et al., 2019</xref>). The Input and Output Privacy framework has been used in the United Nations Privacy Enhancing Technologies Lab (UN PET Lab) to help conceptualize how PETs protect privacy and identify use cases where they would be best deployed (e.g., usage of Homomorphic Encryption when gathering mobile data for analysis to protect Input Privacy, and dissemination of synthetic data to the public to protect Output Privacy) (<xref ref-type="bibr" rid="B49">United Nations, 2022</xref>). The author of this paper also used this framework to help create a taxonomy classifying a wide variety of PETs, identifying ones that would be beneficial for creating a data sharing service for multiple US federal statistical agencies (<xref ref-type="bibr" rid="B30">Nie et al., 2024</xref>).</p>
<p>AI systems currently lack a similar framework for privacy protections. While there has been much discussion about privacy protections for AI systems both within scientific literature and in society at large, and usage of PETs within some AI systems, the lack of a framework that can easily conceptualize and explain how these protections protect privacy, what privacy concerns are being mitigated, and where to place privacy protections in the AI systems causes confusion and leads to incorrect implementations. As there are similarities between AI systems and the data systems previously described, we propose to adapt the Input and Output Privacy framework to work on AI systems to aid in the conceptualization and protection of privacy from a systems-wide perspective. We believe utilization of this framework can enable the utilization of terms and ideas familiar to data managers and data privacy experts and facilitate the cross-pollination of ideas between the two groups, leveraging the overlap with concepts as they have been traditionally used for data systems. Using the Input and Output Privacy framework helps frame discussions about privacy in a way that reflects the process used to develop, train, and deploy AI systems, providing guidance as to the privacy concerns to be aware of at each step along the process, and providing direction towards solutions to mitigate those concerns. It can also help standardize the language being used when talking about protecting privacy, producing a common cross-disciplinary vernacular understandable by technical and non-technical stakeholders. It is our hope that AI developers and deployers can use this framework to help conceptualize where to apply certain types of privacy protections within their systems, what kinds of privacy concerns are mitigated by those protections, and how those protections protect privacy.</p>
</sec>
<sec id="s2">
<title>2 Input and output privacy for data systems and AI systems</title>
<p>Data systems and AI systems have significant overlap in the ways they are constructed, deployed, and used. Data systems store and serve data for queries, visualizations, and analysis, which can include as their components data repositories, databases, data and analytics platforms. For these systems, there exists mature standards and complete frameworks for management, governance, quality, and privacy, such as those detailed within the DAMA DMBOK (<xref ref-type="bibr" rid="B14">DAMA-DMBOK, 2017</xref>). AI systems are defined from 15 U.S.C. 9401(3) as &#x201c;machine-based systems that can, for a given set of human-defined objectives, make predictions, recommendations, or decisions influencing real or virtual environments&#x201d; <xref ref-type="bibr" rid="B6">United State Code, (2025)</xref>. At their core, AI systems are models that are trained using large amounts of data from data systems to make inferences. Because of this, many of the principles and techniques for protecting privacy for traditional data systems apply in a similar manner to AI systems, which enables adaptation of the Input and Output Privacy framework used for data systems onto AI systems.</p>
<p>We can illustrate the parallels between both systems when looking at the processes that are applied to data. In data systems, data typically undergoes the following processes: 1) data ingestion, where data is brought into the system; 2) data pre-processing, where data is transformed to fit the needs of the users; and 3) data service, where the data is made available for users to view, query, and analyze. Input Privacy applies within the data ingestion phase, applying privacy protections before the system and its users can read and understand data contents; Output Privacy applies during the data serving phase, applying privacy protections to data views, queries, and analysis results.</p>
<p>AI systems typically process data according to the following steps: 1) AI Training, where an AI model is trained to fit the data served by data systems; 2) AI model deployment, where the trained AI model is deployed on a computational system, and 3) AI inference, where the AI model is used to make predictions, recommendations, and decisions. AI training parallels the data ingestion step and AI inference parallels the data service step in data systems. As such, Input and Output Privacy considerations can be applied accordingly upon those steps as well. Input Privacy for an AI system applies to the data used for model training, protecting privacy by preventing the AI system and its developers from learning private information. Output Privacy applies to AI inferences, reducing the risk that the AI outputs private information to system users.</p>
<p>The AI training and model deployment steps can only occur after a data system serves data fit for training to the AI system. Afterwards, the AI system can be separated from the data system so that users only have access to the model and its outputs and not the underlying data used to train the model. This presents a fundamental difference between AI systems and data systems that affects the Input and Output Privacy considerations for these systems; removing direct access to underlying data limits vulnerabilities as attacks can only be conducted against AI models and their outputs. This applies even for AI systems that are served continual streams of data, trained using user prompts, or are able to access and query data outside of training data (such as with Retrieval Augmented Generation (RAG)), as users of the AI system would not have direct access to the underlying data being served to the model by the data system. As AI systems rely upon data served by data systems for training and validation, the Input and Output Privacy protections applied to data systems becomes Input Privacy for AI systems, while Output Privacy for AI systems have separate considerations. <xref ref-type="fig" rid="F1">Figure 1</xref> shows a high-level workflow from data system to AI system, and with Input and Output Privacy for each system indicated between the processing steps.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Data system to AI system workflow with locations for Input and Output Privacy. This figure shows the workflow from Data to AI system and where along the workflow Input and Output Privacy are protected for Data Systems (in green) and AI systems (in blue). Data systems and AI systems are closely related, with AI systems being built using existing data systems as their foundation. This is because AI training and model deployment can only occur after the data system can serve data fit for training to the AI system. After training, the AI system and the data system can become two separate entities, as a trained AI system does not need access to the underlying training data to make predictions.</p>
</caption>
<graphic xlink:href="frcmn-06-1600750-g001.tif">
<alt-text content-type="machine-generated">Flowchart illustrating privacy techniques in data and AI systems. The data system includes data ingestion, processing, and serving, with input and output privacy. Techniques for input privacy include secure multi-party computation and homomorphic encryption, while output privacy uses differential privacy and synthetic data. The AI system involves AI training, model deployment, and inference, focusing on input privacy to prevent unauthorized learning and output privacy to protect against data inference.</alt-text>
</graphic>
</fig>
<p>
<xref ref-type="table" rid="T1">Table 1</xref> provides a high-level overview of the potential threats that could arise during the different stages of AI training and deployment, and provide strategies for threat mitigation. We will go into detail about threats and mitigations in <xref ref-type="sec" rid="s3">sections 3</xref> and <xref ref-type="sec" rid="s4">4</xref>.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Threat models and mitigation strategies for each step in AI system training and deployment.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Stage</th>
<th align="left">Privacy threat models</th>
<th align="left">Input or output privacy threat</th>
<th align="left">Mitigation methods</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Model training and fine-tuning</td>
<td align="left">Input of PII<break/>Data poisoning<break/>Unauthorized access to and viewing of PII</td>
<td align="left">Input Privacy</td>
<td align="left">De-identification<break/>Synthetic Data<break/>Noise addition to input data<break/>Homomorphic encryption<break/>Secure multi-party computation<break/>Federated learning<break/>Data audits</td>
</tr>
<tr>
<td align="left">Model inference</td>
<td align="left">Output of learned PII<break/>Membership inference attacks<break/>Attribute inference attacks</td>
<td align="left">Output Privacy</td>
<td align="left">Suppression of PII in outputs<break/>Noise addition to outputs<break/>Query limitation<break/>Monitoring of queries and outputs<break/>Tiered access controls<break/>Sanctions for inappropriate use</td>
</tr>
<tr>
<td align="left">Continual training and reinforcement</td>
<td align="left">Input of PII (especially from user prompts)<break/>Data poisoning (through user prompts)</td>
<td align="left">Input Privacy</td>
<td align="left">De-identification<break/>PII filtering<break/>Monitoring of inputs</td>
</tr>
<tr>
<td align="left">Retrieval Augmented Generation</td>
<td align="left">Input of PII<break/>Data poisoning<break/>Unauthorized access to and viewing of PII (in the RAG store)</td>
<td align="left">Input Privacy</td>
<td align="left">De-identification<break/>Synthetic Data<break/>Noise addition to input data<break/>Homomorphic encryption<break/>Data audits<break/>Monitoring of model access to RAG stores</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s3">
<title>3 Considerations for protecting input privacy for AI systems</title>
<p>The goals when protecting Input Privacy for AI systems are the same as when protecting Input Privacy for data systems, that is to prevent those who develop and operate the AI system (which include the developers, AI service providers, cloud computing service providers, and other users) as well as the AI system itself from learning private information. Input Privacy considerations are especially important for data controllers who wish to train and host AI systems outside their security perimeters, which happens often as many of these systems require computational power only available upon cloud-based platforms. These considerations also apply to models that utilize continuous learning, such as those that use user prompts for training, as well as models that utilize retrieval augmented generation to bring in external information it may not have been trained on.</p>
<p>PETs used to protect Input Privacy for data systems, such as Secure Multiparty Computation and Homomorphic Encryption, have been investigated for a variety of AI systems (<xref ref-type="bibr" rid="B34">Panzade et al., 2024</xref>; Nguyen et al.; <xref ref-type="bibr" rid="B8">Badawi et al., 2020</xref>; <xref ref-type="bibr" rid="B20">Kim et al., 2022</xref>; <xref ref-type="bibr" rid="B25">Liu and Liu, 2023</xref>; <xref ref-type="bibr" rid="B35">Rho et al., 2024</xref>; <xref ref-type="bibr" rid="B44">Yan et al., 2024</xref>; <xref ref-type="bibr" rid="B24">Li et al., 2024</xref>), with a family of techniques for training AIs known as Federated Learning deployed in AI systems implemented by Apple and Google (<xref ref-type="bibr" rid="B27">McMahan and Ramage, 2017</xref>; <xref ref-type="bibr" rid="B4">Apple Machine Learning Research, 2017</xref>). However, these techniques all apply in situations where data served to an AI system may include private information; it is oftentimes more expedient and protective of privacy to remove private information from the data before serving to the AI system, so that the system does not have a chance to learn private information at all. As such, Output Privacy protecting techniques for data systems, like de-identification, differential privacy, and synthetic data, become effective input privacy protecting techniques for AI systems. Usage of training data that has undergone these protections treatment may even improve performance for certain AI models (<xref ref-type="bibr" rid="B48">Zhu et al., 2022</xref>; <xref ref-type="bibr" rid="B2">Arasteh et al., 2024</xref>; <xref ref-type="bibr" rid="B31">Nikolenko, 2021</xref>).</p>
<p>There are some specific Input Privacy considerations that only apply to certain types of AI models. For instance, some LLMs use user input as training data for the model, which can pose risks to user privacy as users may create prompts using private information such as names, locations, and medical diagnoses. These user prompts can then leak private information to other users of the model (<xref ref-type="bibr" rid="B21">Kshetri, 2023</xref>; <xref ref-type="bibr" rid="B38">Smith et al., 2024</xref>; <xref ref-type="bibr" rid="B47">Zhang et al., 2024</xref>). Another Input Privacy consideration that is protecting against Model Poisoning attacks, which involve malicious actors inserting &#x201c;poisoned&#x201d; data to train AI models, which can make the model output sensitive or private information contained within the training data (<xref ref-type="bibr" rid="B17">El et al., 2024</xref>). Two examples include Li et al. who demonstrated an attack that can be conducted on pre-trained models during the fine-tuning phase (<xref ref-type="bibr" rid="B23">Li et al., 2021</xref>), and Yao et al. who demonstrated a method they call PoisonPrompt that conducts backdoor attacks on LLMs that use user-generated prompts as training data (<xref ref-type="bibr" rid="B45">Yao et al., 2023</xref>).</p>
<p>While mitigating Input Privacy risks using PETs such as homomorphic encryption and secure multi party computation could be possible, these methods may not be sufficient (for instance, they may not mitigate risks of model poisoning) and can cause significant degradation in model performance (<xref ref-type="bibr" rid="B44">Yan et al., 2024</xref>; <xref ref-type="bibr" rid="B24">Li et al., 2024</xref>; <xref ref-type="bibr" rid="B10">Brown et al., 2022</xref>). Results published by Zama where they benchmarked training a deep neural network using clear-text data <italic>versus</italic> data that has undergone fully homomorphic encryption showed significant slowdowns in runtime on the relatively simple task of MNIST classification (<xref ref-type="bibr" rid="B13">Chillotti et al., 2021</xref>; <xref ref-type="bibr" rid="B5">Chevallier-Mames and Kherfallah, 2024</xref>). While some organizations try to mitigate privacy risks through usage of Federated Learning, not only can there be deployment hurdles, but there still exist privacy attacks on model updates and on trained models that can reveal private information (<xref ref-type="bibr" rid="B28">Near, 2024</xref>). For holistic protection of Input Privacy, organizations using AI systems should implement policies and procedures to prevent input of private information and poisoned data into AI systems. These include on-site deployment of AI systems, limiting the types of inputs from users and monitoring user inputs to ensure compliance (or removing the ability of AI systems to learn from user inputs entirely), review and security audits of the data being used for training models, limiting and monitoring access to training data, and conducting privacy and security reviews of public data prior to usage for AI training. Developers and deployers of PETs and AI systems have stated during interviews that organizations are more familiar with these more traditional methods than techniques like homomorphic encryption and secure multi party computation and most have prior experience implementing similar controls upon data systems (<xref ref-type="bibr" rid="B30">Nie et al., 2024</xref>). Application of that experience may provide a more practical pathway for protecting Input Privacy than usage of PETs.</p>
</sec>
<sec id="s4">
<title>4 Considerations for protecting output privacy for AI systems</title>
<p>Protecting Output Privacy in AI systems involves protecting the model and its inferences from leaking private information the model may have learned. Research has shown that some AI models have a memory of the input data that are used for training, which can lead to them outputting information about the data used to train them (<xref ref-type="bibr" rid="B43">Wei et al., 2024</xref>). Researchers have demonstrated attacks leveraging this vulnerability using LLMs - through prompting the model to generate large amounts of text, attackers can potentially generate verbatim passages of text used to train the model, with models that are larger and more complex more likely to memorize and output training text (<xref ref-type="bibr" rid="B11">Carlini et al., 2021</xref>; <xref ref-type="bibr" rid="B39">Staab et al., 2024</xref>; <xref ref-type="bibr" rid="B12">Carlini et al., 2023</xref>). They have conducted successful attacks against GPT-2 and BERT-like models where attackers were able to reconstruct individual training examples or large portions of training text (<xref ref-type="bibr" rid="B46">Zhang et al., 2022</xref>; <xref ref-type="bibr" rid="B22">Lehman et al., 2021</xref>; <xref ref-type="bibr" rid="B15">Diera et al., 2023</xref>).</p>
<p>This vulnerability the main reason why much effort has been spent protecting Input Privacy for AI systems. However, just protecting Input Privacy is not sufficient to protect attackers from obtaining private information from model outputs. For instance, with Membership Inference Attacks, an attacker can use external information to query a model to determine whether an individual was part of the dataset used to train the model (<xref ref-type="bibr" rid="B32">Niu et al., 2024</xref>). In certain cases, just knowing that an individual&#x2019;s information was part of the training data can be considered a leak of sensitive private information, examples of which include models that make predictions for medical diagnoses, models trained using data from protected classes like children or substance abuse victims, and models used for sensitive decision making such as qualification for government assistance. Another potential privacy vulnerability is Attribute Inference Attacks, where an attacker with external information about data subjects attempts to use the outputs of a model to infer private information about individuals. A study conducted by Pan et al. found that several current state-of-the-art LLMs are susceptible to revealing sensitive attributes about individuals, such as identities, genetic data, health information, and location information, through reverse-engineering of embeddings within the models (<xref ref-type="bibr" rid="B33">Pan et al., 2020</xref>). Another study conducted by Staab et al. demonstrated that inferences made by LLMs can reveal personal attributes linked to publicly available Reddit profiles (<xref ref-type="bibr" rid="B39">Staab et al., 2024</xref>).</p>
<p>To protect against these types of attacks, researchers have investigated various methods for protecting Output Privacy using PETs. The outputs of AI models can undergo transformations for de-identification, such as suppression of outputted PII, aggregation, and rounding. Majmudar et al. presented a differential privacy method that could work for text generation in LLMs (<xref ref-type="bibr" rid="B26">Majmudar et al., 2022</xref>); however, usage of differential privacy requires careful selection of privacy parameters within the system (epsilon and delta), of which there is insufficient guidance and a lack of benchmarks for effective privacy protection (<xref ref-type="bibr" rid="B16">Dwork et al., 2019</xref>). A more practical approach for protecting Output Privacy is implementation of privacy and security controls around the AI system. In a similar situation as with Input Privacy controls described in the previous section, developers and deployers of PETs and AI systems have stated during interviews that traditional privacy and security controls are oftentimes more familiar for organizations who have experience implementing similar controls for data systems (<xref ref-type="bibr" rid="B30">Nie et al., 2024</xref>). An example of some of these controls can be found in the recommendations of the Office of Science and Technology Policy in the White House for AI systems developed and used by the US Federal Government:<list list-type="simple">
<list-item>
<p>&#x2022; Conducting risk assessments</p>
</list-item>
<list-item>
<p>&#x2022; Limiting data collection</p>
</list-item>
<list-item>
<p>&#x2022; Seeking and confirming consent</p>
</list-item>
<list-item>
<p>&#x2022; Following security best practices</p>
</list-item>
<list-item>
<p>&#x2022; Providing more protection for data from sensitive domains</p>
</list-item>
<list-item>
<p>&#x2022; Reporting on data collection and storage (The White House)</p>
</list-item>
</list>
</p>
<p>Other controls that can help protect privacy include technical controls to limit allowable user queries as well as limits to system outputs, access controls to limit who can use the AI systems, requirements for authentication of identity before use, setting limits to the term of access, providing tiered access based on user trust and model sensitivity (e.g., a user with sufficient security clearance and verified credentials can access a model trained using PII, whereas users without the security clearance can only use models trained on public data), logging and regular monitoring of access to models, model queries, and model outputs, machine and human review of model outputs to detect potential malicious use, and contractual agreements between model providers and users (i.e., acceptable use agreements, terms of use) with sanctions for inappropriate use to deter malicious users through threat of punishment. Many organizations have similar controls in place for existing data systems, from which they can use their experience to expedite the implementation of similar controls for their AI systems (<xref ref-type="bibr" rid="B30">Nie et al., 2024</xref>).</p>
</sec>
<sec id="s5">
<title>5 Case study: application of the input and output privacy framework for an LLM deployment</title>
<p>To demonstrate how the Input and Output Privacy Framework can help clarify what privacy concerns are being mitigated where in the system, and how they are being mitigated, we can apply the framework to analyze the deployment of a fine-tuned LLM as a job aid within an organization. AI developers work with the Privacy Office to conduct assessments, identifying privacy risks that can arise from usage of the system. The main risks identified center around documents that contain PII about the organization&#x2019;s customers, which can only be used for specific purposes related to customer service. To evaluate how these risks affect the AI system, they determine how it impacts Input Privacy (e.g., input of documents containing PII for fine-tuning the model results in the model remembering private information) and Output Privacy (e.g., model outputs private information when queried for purposes outside of customer service). As it is possible for the LLM to retain private information, and the organization plans to use the LLM for purposes beyond customer service, this privacy risk must be mitigated. After evaluating various options including PETs, they decide use simple redaction to remove PII from the documents used for training to protect Input Privacy, and set up a system for limiting queries and outputs and monitoring employee usage of the LLM to protect Output Privacy, aligning with their current data management practices and matching the technical capabilities of their organization.</p>
</sec>
<sec sec-type="conclusion" id="s6">
<title>6 Conclusion</title>
<p>Utilization of the Input and Output Privacy Framework helps clarify what protections should be put into place in different parts of AI systems to ensure holistic privacy protection. Significant effort has been put into protecting Input Privacy for AI due to the thinking that if AI is not trained on private information, then the privacy risk has been managed. However, there are still privacy attacks on the outputs of AI models such as membership inference attacks and attribute inference attacks that present real and clear privacy risks. Protection of Input and Output Privacy involves a combination of privacy techniques which can include usage of PETs; however, a more practical path for many organizations would be to implement privacy and security controls around a system such as access controls, query limitation, usage monitoring, and strict enforcement of contractual agreements. Privacy and security controls are easier to implement for AI systems that are not public facing, such as LLMs deployed within an organization&#x2019;s internal systems. Public-facing AI systems have a much harder time implementing controls, which makes it more imperative that Input Privacy is protected properly.</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="s7">
<title>Data availability statement</title>
<p>The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec sec-type="author-contributions" id="s8">
<title>Author contributions</title>
<p>ZN: Conceptualization, Formal Analysis, Investigation, Methodology, Project administration, Writing &#x2013; original draft, Writing &#x2013; review and editing. LD: Funding acquisition, Supervision, Writing &#x2013; review and editing. RL: Conceptualization, Writing &#x2013; review and editing.</p>
</sec>
<sec sec-type="funding-information" id="s9">
<title>Funding</title>
<p>The author(s) declare that financial support was received for the research and/or publication of this article. The research and publication of this article is funded by RTI International.</p>
</sec>
<sec sec-type="COI-statement" id="s10">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="ai-statement" id="s11">
<title>Generative AI statement</title>
<p>The author(s) declare that no Generative AI was used in the creation of this manuscript.</p>
<p>Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.</p>
</sec>
<sec sec-type="disclaimer" id="s12">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="web">
<collab>10 Misunderstandings Related to Anonymisation</collab> (<year>2023</year>). <article-title>Agencia Espa&#xf1;ola de Protecci&#xf3;n de Datos (AEPD)</article-title>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://edps.europa.eu/data-protection/our-work/publications/papers/aepd-edps-joint-paper-10-misunderstandings-related_en">https://edps.europa.eu/data-protection/our-work/publications/papers/aepd-edps-joint-paper-10-misunderstandings-related_en</ext-link>.</comment>
</citation>
</ref>
<ref id="B4">
<citation citation-type="book">
<collab>Apple Machine Learning Research</collab> (<year>2017</year>). <publisher-name>Learning with privacy at scale. Apple</publisher-name>. <comment>Available from: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://machinelearning.apple.com/research/learning-with-privacy-at-scale">https://machinelearning.apple.com/research/learning-with-privacy-at-scale</ext-link>.</comment>
</citation>
</ref>
<ref id="B2">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Arasteh</surname>
<given-names>S. T.</given-names>
</name>
<name>
<surname>Lotfinia</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Nolte</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Saehn</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Isfort</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Kuhl</surname>
<given-names>C.</given-names>
</name>
<etal/>
</person-group> (<year>2024</year>). <article-title>Securing collaborative medical AI by using differential privacy: domain transfer for classification of chest radiographs</article-title>. <source>Radiol. Artif. Intell.</source> <volume>6</volume> (<issue>1</issue>), <fpage>e230212</fpage>. <pub-id pub-id-type="doi">10.1148/ryai.230212</pub-id>
</citation>
</ref>
<ref id="B3">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Archer</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>O&#x2019;Hara</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Issa</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Straus</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2021</year>). <source>Sharing sensitive Department of Education data across organizational Boundaries using secure Multiparty computation</source>, <volume>9</volume>. <publisher-name>Washington, DC: Georgetown University</publisher-name>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://drive.google.com/file/d/1CURfl3q8j_NOBiaOuPEleJBZFpwQcwti/view">https://drive.google.com/file/d/1CURfl3q8j_NOBiaOuPEleJBZFpwQcwti/view</ext-link>.</comment>
</citation>
</ref>
<ref id="B8">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Badawi</surname>
<given-names>A. A.</given-names>
</name>
<name>
<surname>Hoang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Mun</surname>
<given-names>C. F.</given-names>
</name>
<name>
<surname>Laine</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Aung</surname>
<given-names>K. M. M.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>PrivFT: private and Fast text classification with homomorphic encryption</article-title>. <source>IEEE Access</source> <volume>8</volume>, <fpage>226544</fpage>&#x2013;<lpage>226556</lpage>. <pub-id pub-id-type="doi">10.1109/access.2020.3045465</pub-id>
</citation>
</ref>
<ref id="B9">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Barrientos</surname>
<given-names>A. F.</given-names>
</name>
<name>
<surname>Williams</surname>
<given-names>A. R.</given-names>
</name>
<name>
<surname>Snoke</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Bowen</surname>
<given-names>C. M.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>A Feasibility study of differentially private summary Statistics and Regression analyses with Evaluations on administrative and survey data</article-title>. <source>arXiv</source> <volume>119</volume>, <fpage>52</fpage>&#x2013;<lpage>65</lpage>. <pub-id pub-id-type="doi">10.1080/01621459.2023.2270795</pub-id>
</citation>
</ref>
<ref id="B10">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Brown</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Mireshghallah</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Shokri</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Tram&#xe8;r</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>What does it mean for a language model to Preserve privacy?</article-title> <source>arXiv</source>, <fpage>2280</fpage>&#x2013;<lpage>2292</lpage>. <pub-id pub-id-type="doi">10.1145/3531146.3534642</pub-id>
</citation>
</ref>
<ref id="B11">
<citation citation-type="web">
<person-group person-group-type="author">
<name>
<surname>Carlini</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Tram&#xe8;r</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Wallace</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Jagielski</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Herbert-Voss</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>K.</given-names>
</name>
<etal/>
</person-group> (<year>2021</year>). <article-title>Extracting training data from large language models</article-title>. <fpage>2633</fpage>&#x2013;<lpage>2650</lpage>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.usenix.org/conference/usenixsecurity21/presentation/carlini-extracting">https://www.usenix.org/conference/usenixsecurity21/presentation/carlini-extracting</ext-link>.</comment>
</citation>
</ref>
<ref id="B12">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Carlini</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Ippolito</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Jagielski</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Tramer</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2023</year>). &#x201c;<article-title>Quantifying Memorization across neural language models</article-title>,&#x201d; in <source>The Eleventh International Conference on learning Representations</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://openreview.net/forum?id=TatRHT_1cK">https://openreview.net/forum?id&#x3d;TatRHT_1cK</ext-link>.</comment>
</citation>
</ref>
<ref id="B5">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chevallier-Mames</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Kherfallah</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2024</year>). <article-title>Making FHE Faster for ML: beating our previous paper benchmarks with concrete ML. Zama.ai</article-title>. <comment>Available online at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.zama.ai/post/making-fhe-faster-for-ml-beating-our-previous-paper-benchmarks-with-concrete-ml">https://www.zama.ai/post/making-fhe-faster-for-ml-beating-our-previous-paper-benchmarks-with-concrete-ml</ext-link>.</comment>
</citation>
</ref>
<ref id="B13">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chillotti</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Joye</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Paillier</surname>
<given-names>P.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Programmable Bootstrapping enables Efficient homomorphic inference of deep neural networks</article-title>. <fpage>1</fpage>&#x2013;<lpage>19</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-030-78086-9_1</pub-id>
</citation>
</ref>
<ref id="B14">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Dama-Dmbok</surname>
<given-names>I. D.</given-names>
</name>
</person-group> (<year>2017</year>). <source>Data management Body of Knowledge</source>. <edition>2nd Edition</edition>. <publisher-loc>Denville, NJ, USA</publisher-loc>: <publisher-name>Technics Publications, LLC</publisher-name>.</citation>
</ref>
<ref id="B15">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Diera</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Lell</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Garifullina</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Scherp</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>Memorization of named entities in fine-tuned BERT models</article-title>. <fpage>258</fpage>&#x2013;<lpage>279</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-031-40837-3_16</pub-id>
</citation>
</ref>
<ref id="B16">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dwork</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Kohli</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Mulligan</surname>
<given-names>D.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Differential privacy in practice: Expose your epsilons</article-title>. <source>J. Priv. Confidentiality</source> <volume>9</volume> (<issue>2</issue>). <pub-id pub-id-type="doi">10.29012/jpc.689</pub-id>
</citation>
</ref>
<ref id="B17">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>El Mestari</surname>
<given-names>S. Z.</given-names>
</name>
<name>
<surname>Lenzini</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Demirci</surname>
<given-names>H.</given-names>
</name>
</person-group> (<year>2024</year>). <article-title>Preserving data privacy in machine learning systems</article-title>. <source>Comput. and Secur.</source> <volume>137</volume>, <fpage>103605</fpage>. <pub-id pub-id-type="doi">10.1016/j.cose.2023.103605</pub-id>
</citation>
</ref>
<ref id="B18">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>El Emam</surname>
<given-names>K.</given-names>
</name>
</person-group> (<year>2013</year>). <source>Guide to the de-identification of Personal Health Information</source>. <publisher-name>Boca Raton, FL: Taylor and Francis</publisher-name>.</citation>
</ref>
<ref id="B19">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Giomi</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Boenisch</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Wehmeyer</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Tasn&#xe1;di</surname>
<given-names>B.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>A Unified framework for Quantifying privacy risk in synthetic data</article-title>. <source>arXiv</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/2211.10459">http://arxiv.org/abs/2211.10459</ext-link>.</comment>
</citation>
</ref>
<ref id="B20">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kim</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Jiang</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Lauter</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Ismayilzada</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Shams</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Secure human action recognition by encrypted neural network inference</article-title>. <source>Nat. Commun.</source> <volume>13</volume> (<issue>1</issue>), <fpage>4799</fpage>. <pub-id pub-id-type="doi">10.1038/s41467-022-32168-5</pub-id>
<pub-id pub-id-type="pmid">35970834</pub-id>
</citation>
</ref>
<ref id="B21">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kshetri</surname>
<given-names>N.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>Cybercrime and privacy threats of large language models</article-title>. <source>IT Prof.</source> <volume>25</volume> (<issue>03</issue>), <fpage>9</fpage>&#x2013;<lpage>13</lpage>. <pub-id pub-id-type="doi">10.1109/mitp.2023.3275489</pub-id>
</citation>
</ref>
<ref id="B22">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lehman</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Jain</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Pichotta</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Goldberg</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Wallace</surname>
<given-names>B. C.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Does BERT Pretrained on Clinical Notes reveal sensitive data?</article-title> <source>arXiv</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/2104.07762">http://arxiv.org/abs/2104.07762</ext-link>.</comment>
</citation>
</ref>
<ref id="B23">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Song</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Zeng</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Ma</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Qiu</surname>
<given-names>X.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Backdoor attacks on pre-trained models by Layerwise Weight poisoning</article-title>. <source>arXiv</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/2108.13888">http://arxiv.org/abs/2108.13888</ext-link>.</comment>
</citation>
</ref>
<ref id="B24">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Qian</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2024</year>). <article-title>A survey on private transformer inference</article-title>. <source>arXiv</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/2412.08145">http://arxiv.org/abs/2412.08145</ext-link>.</comment>
</citation>
</ref>
<ref id="B25">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>LLMs can understand encrypted prompt: towards privacy-computing Friendly Transformers</article-title>. <source>arXiv</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/2305.18396">http://arxiv.org/abs/2305.18396</ext-link>.</comment>
</citation>
</ref>
<ref id="B26">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Majmudar</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Dupuy</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Peris</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Smaili</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Gupta</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Zemel</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Differentially private Decoding in large language models</article-title>. <source>arXiv</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/2205.13621">http://arxiv.org/abs/2205.13621</ext-link>.</comment>
</citation>
</ref>
<ref id="B27">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>McMahan</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Ramage</surname>
<given-names>D.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>Federated learning: Collaborative machine learning without Centralized training data</article-title>. <source>Google Res</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://blog.research.google/2017/04/federated-learning-collaborative.html?abstract_id=3808054">https://blog.research.google/2017/04/federated-learning-collaborative.html?abstract_id&#x3d;3808054</ext-link>.</comment>
</citation>
</ref>
<ref id="B28">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Near</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2024</year>). <source>Privacy attacks in Federated learning</source>. <publisher-name>NIST</publisher-name>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.nist.gov/blogs/cybersecurity-insights/privacy-attacks-federated-learning">https://www.nist.gov/blogs/cybersecurity-insights/privacy-attacks-federated-learning</ext-link>.</comment>
</citation>
</ref>
<ref id="B29">
<citation citation-type="web">
<person-group person-group-type="author">
<name>
<surname>Nguyen</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Phan</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Nguyen</surname>
<given-names>T.</given-names>
</name>
</person-group> (<year>2025</year>). <article-title>An Efficient approach for securing Audio data in AI training with fully homomorphic encryption</article-title>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.authorea.com/doi/full/10.36227/techrxiv.170956397.78402834?commit=8ad5d37adb9c0e6375b7feaacc3436accfbc0a2d">https://www.authorea.com/doi/full/10.36227/techrxiv.170956397.78402834?commit&#x3d;8ad5d37adb9c0e6375b7feaacc3436accfbc0a2d</ext-link>.</comment>
</citation>
</ref>
<ref id="B30">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Nie</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Lewis</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Gartland-Grey</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Riley</surname>
<given-names>A. F.</given-names>
</name>
</person-group> (<year>2024</year>). <article-title>America&#x2019;s DataHub Consortium: privacy preserving Technology phase 1 &#x2013; Environmental scan</article-title>. <source>RTI Int. Natl. Cent. Sci. Eng. Statistics</source>, <fpage>69</fpage>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.americasdatahub.org/wp-content/uploads/2024/05/ADC-PPT_FinalReport.pdf">https://www.americasdatahub.org/wp-content/uploads/2024/05/ADC-PPT_FinalReport.pdf</ext-link>.</comment>
</citation>
</ref>
<ref id="B31">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Nikolenko</surname>
<given-names>S. I.</given-names>
</name>
</person-group> (<year>2021</year>). <source>Synthetic data for deep learning</source>, <volume>174</volume>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://link.springer.com/10.1007/978-3-030-75178-4">https://link.springer.com/10.1007/978-3-030-75178-4</ext-link>.</comment>
</citation>
</ref>
<ref id="B32">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Niu</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Shen</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Chi</surname>
<given-names>H.</given-names>
</name>
<etal/>
</person-group> (<year>2024</year>). <article-title>A survey on membership inference attacks and defenses in machine learning</article-title>. <source>J. Inf. Intell.</source> <volume>2</volume> (<issue>5</issue>), <fpage>404</fpage>&#x2013;<lpage>454</lpage>. <pub-id pub-id-type="doi">10.1016/j.jiixd.2024.02.001</pub-id>
</citation>
</ref>
<ref id="B33">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Pan</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Ji</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2020</year>). &#x201c;<article-title>Privacy risks of General-Purpose language models</article-title>,&#x201d; in <source>2020 IEEE Symposium on security and privacy (SP)</source>, <fpage>1314</fpage>&#x2013;<lpage>1331</lpage>.</citation>
</ref>
<ref id="B34">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Panzade</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Takabi</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Cai</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2024</year>). &#x201c;<article-title>MedBlindTuner: towards privacy-preserving fine-tuning on Biomedical Images with Transformers and fully homomorphic encryption</article-title>,&#x201d; in <source>AI for health Equity and Fairness: leveraging AI to Address social Determinants of health</source>. Editors <person-group person-group-type="editor">
<name>
<surname>Shaban-Nejad</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Michalowski</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Bianco</surname>
<given-names>S.</given-names>
</name>
</person-group> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer Nature Switzerland</publisher-name>), <fpage>197</fpage>&#x2013;<lpage>208</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-031-63592-2_15</pub-id>
</citation>
</ref>
<ref id="B35">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Rho</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Kim</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Park</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Kim</surname>
<given-names>J. W.</given-names>
</name>
<name>
<surname>Chae</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Cheon</surname>
<given-names>J. H.</given-names>
</name>
<etal/>
</person-group> (<year>2024</year>). <article-title>Encryption-friendly LLM Architecture</article-title>. <source>arXiv</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/2410.02486">http://arxiv.org/abs/2410.02486</ext-link>.</comment>
</citation>
</ref>
<ref id="B36">
<citation citation-type="web">
<person-group person-group-type="author">
<name>
<surname>Ricciato</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Bujnowska</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Wirthmann</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Hahn</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Barredo-Capelot</surname>
<given-names>E.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>A reflection on privacy and data Confidentiality in Official Statistics</article-title>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.researchgate.net/publication/339030033_A_reflection_on_privacy_and_data_confidentiality_in_Official_Statistics">https://www.researchgate.net/publication/339030033_A_reflection_on_privacy_and_data_confidentiality_in_Official_Statistics</ext-link>.</comment>
</citation>
</ref>
<ref id="B37">
<citation citation-type="web">
<person-group person-group-type="author">
<name>
<surname>Santos</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Zanussi</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Privacy preserving technologies, part three: private statistical analysis and private text classification based on homomorphic encryption</article-title>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.statcan.gc.ca/en/data-science/network/statistical-analysis-homomorphic-encryption">https://www.statcan.gc.ca/en/data-science/network/statistical-analysis-homomorphic-encryption</ext-link>.</comment>
</citation>
</ref>
<ref id="B38">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Smith</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Shamsabadi</surname>
<given-names>A. S.</given-names>
</name>
<name>
<surname>Ashurst</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Weller</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2024</year>). <article-title>Identifying and mitigating privacy risks Stemming from language models: a survey</article-title>. <source>arXiv</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/2310.01424">http://arxiv.org/abs/2310.01424</ext-link>.</comment>
</citation>
</ref>
<ref id="B39">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Staab</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Vero</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Balunovi&#x107;</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Vechev</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2024</year>). <article-title>Beyond Memorization: Violating privacy via inference with large language models</article-title>. <source>arXiv</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/2310.07298">http://arxiv.org/abs/2310.07298</ext-link>.</comment>
</citation>
</ref>
<ref id="B40">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Stutz</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Structured Transparency: Ensuring input and output privacy</article-title>. <source>OpenMined Blog Priv. AI Ser</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://blog.openmined.org/structured-transparency-input-output-privacy/">https://blog.openmined.org/structured-transparency-input-output-privacy/</ext-link>.</comment>
</citation>
</ref>
<ref id="B41">
<citation citation-type="web">
<collab>The United Nations</collab> (<year>2023</year>). <article-title>Guide on privacy-Enhancing technologies for Official Statistics</article-title>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://unstats.un.org/bigdata/task-teams/privacy/guide/2023_UN%20PET%20Guide.pdf">https://unstats.un.org/bigdata/task-teams/privacy/guide/2023_UN%20PET%20Guide.pdf</ext-link>.</comment>
</citation>
</ref>
<ref id="B42">
<citation citation-type="web">
<collab>The White House</collab> (<year>2025</year>). <article-title>Blueprint for an AI Bill of Rights &#x7c; OSTP</article-title>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.whitehouse.gov/ostp/ai-bill-of-rights/">https://www.whitehouse.gov/ostp/ai-bill-of-rights/</ext-link>.</comment>
</citation>
</ref>
<ref id="B49">
<citation citation-type="book">
<collab>United Nations</collab> (<year>2022</year>). <publisher-name>UN PET Lab. News release</publisher-name>. <comment>Available online at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://unstats.un.org/bigdata/events/2022/unsc-un-pet-lab/UN%20PET%20Lab%20-%20Press%20Release%20-%2025%20Jan%202022.pdf">https://unstats.un.org/bigdata/events/2022/unsc-un-pet-lab/UN%20PET%20Lab%20-%20Press%20Release%20-%2025%20Jan%202022.pdf</ext-link>.</comment>
</citation>
</ref>
<ref id="B6">
<citation citation-type="book">
<collab>United States Code</collab> (<year>2025</year>). <publisher-name>Title 15, Commerce and trade. &#xa7; 9401</publisher-name>. <comment>Available online at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://uscode.house.gov/view.xhtml?req=(title:15%20section:9401%20edition:prelim)">https://uscode.house.gov/view.xhtml?req=(title:15%20section:9401%20edition:prelim)</ext-link>.</comment>
</citation>
</ref>
<ref id="B43">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wei</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>L. Y.</given-names>
</name>
<name>
<surname>Ding</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Ong</surname>
<given-names>K. L.</given-names>
</name>
<etal/>
</person-group> (<year>2024</year>). <article-title>Memorization in deep learning: a survey</article-title>. <source>arXiv</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/2406.03880">http://arxiv.org/abs/2406.03880</ext-link>.</comment>
</citation>
</ref>
<ref id="B44">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yan</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Dong</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Ren</surname>
<given-names>Z.</given-names>
</name>
<etal/>
</person-group> (<year>2024</year>). <article-title>On protecting the data privacy of large language models (LLMs): a survey</article-title>. <source>arXiv</source>, <fpage>1</fpage>&#x2013;<lpage>12</lpage>. <pub-id pub-id-type="doi">10.1109/icmc60390.2024.00008</pub-id>
</citation>
</ref>
<ref id="B45">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yao</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Lou</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Qin</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>PoisonPrompt: backdoor attack on Prompt-based large language models</article-title>. <source>arXiv</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/2310.12439">http://arxiv.org/abs/2310.12439</ext-link>.</comment>
</citation>
</ref>
<ref id="B46">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Hidano</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Koushanfar</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Text revealer: private text reconstruction via model Inversion attacks against Transformers</article-title>. <source>arXiv</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/2209.10505">http://arxiv.org/abs/2209.10505</ext-link>.</comment>
</citation>
</ref>
<ref id="B47">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Ye</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Yi</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Tang</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Shui</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Xing</surname>
<given-names>H.</given-names>
</name>
<etal/>
</person-group> (<year>2024</year>). <article-title>&#x201c;Ghost of the past&#x201d;: identifying and resolving privacy leakage from LLM&#x2019;s memory through proactive user interaction</article-title>. <source>arXiv</source>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/2410.14931">http://arxiv.org/abs/2410.14931</ext-link>.</comment>
</citation>
</ref>
<ref id="B48">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhu</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Ye</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>P. S.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>More than privacy: applying differential privacy in Key Areas of Artificial Intelligence</article-title>. <source>IEEE Trans. Knowl. Data Eng.</source> <volume>34</volume> (<issue>6</issue>), <fpage>2824</fpage>&#x2013;<lpage>2843</lpage>. <pub-id pub-id-type="doi">10.1109/tkde.2020.3014246</pub-id>
</citation>
</ref>
</ref-list>
</back>
</article>