{"id":"https://openalex.org/W4403486681","doi":"https://doi.org/10.3233/faia240958","title":"SecPE: Secure Prompt Ensembling for Private and Robust Large\u00a0Language\u00a0Models","display_name":"SecPE: Secure Prompt Ensembling for Private and Robust Large\u00a0Language\u00a0Models","publication_year":2024,"publication_date":"2024-10-16","ids":{"openalex":"https://openalex.org/W4403486681","doi":"https://doi.org/10.3233/faia240958"},"language":"en","primary_location":{"id":"doi:10.3233/faia240958","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia240958","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240958","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240958","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115594068","display_name":"Jiawen Zhang","orcid":"https://orcid.org/0000-0001-9266-7870"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiawen Zhang","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, Zhejiang University","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016558517","display_name":"Kejia Chen","orcid":"https://orcid.org/0000-0001-7700-290X"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kejia Chen","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, Zhejiang University","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043914348","display_name":"Zunlei Feng","orcid":"https://orcid.org/0000-0001-8640-8434"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zunlei Feng","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, Zhejiang University","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041918034","display_name":"Jian Lou","orcid":"https://orcid.org/0000-0002-4110-2068"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Lou","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, Zhejiang University","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026532752","display_name":"Mingli Song","orcid":"https://orcid.org/0000-0003-2621-6048"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingli Song","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, Zhejiang University","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5115594068"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":1.5896,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.85172803,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9485999941825867,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9485999941825867,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.43360504508018494},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.37094348669052124},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3276456296443939},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.321281760931015}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.43360504508018494},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.37094348669052124},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3276456296443939},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.321281760931015}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia240958","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia240958","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240958","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia240958","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia240958","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA240958","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5199999809265137,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4403486681.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"With":[0],"the":[1,7,36,44,79,111,120,134,151,172,191,194,211],"growing":[2],"popularity":[3],"of":[4,38,114,139,156,174,193,217],"LLMs":[5],"among":[6,43],"general":[8],"public":[9],"users,":[10],"privacy-preserving":[11],"and":[12,49,61,74,154,167],"adversarial":[13,82],"robustness":[14,83,170],"have":[15,24],"become":[16],"two":[17,56],"pressing":[18],"demands":[19],"for":[20,102,133,202],"LLM-based":[21],"services,":[22],"which":[23,125,214],"largely":[25],"been":[26],"pursued":[27],"separately":[28],"but":[29],"rarely":[30],"jointly.":[31],"In":[32],"this":[33,221],"paper,":[34],"to":[35,149,180],"best":[37],"our":[39],"knowledge,":[40],"we":[41,122],"are":[42],"first":[45],"attempts":[46],"towards":[47],"robust":[48],"private":[50,59,100,182],"LLM":[51,92],"inference":[52,60,71,101,183],"by":[53,69,76,84],"tightly":[54],"integrating":[55],"disconnected":[57],"fields:":[58],"prompt":[62,103,140,203],"ensembling.":[63,141],"The":[64,158],"former":[65],"protects":[66],"users\u2019":[67],"privacy":[68],"encrypting":[70],"data":[72],"transmitted":[73],"processed":[75],"LLMs,":[77],"while":[78],"latter":[80],"enhances":[81],"yielding":[85],"an":[86],"aggregated":[87],"output":[88],"from":[89],"multiple":[90],"prompted":[91],"responses.":[93],"Although":[94],"widely":[95],"recognized":[96],"as":[97],"effective":[98],"individually,":[99],"ensembling":[104],"together":[105],"entails":[106],"new":[107],"challenges":[108],"that":[109,161,198],"render":[110],"naive":[112],"combination":[113],"existing":[115],"techniques":[116],"inefficient.":[117],"To":[118],"overcome":[119],"hurdles,":[121],"propose":[123],"SecPE,":[124],"designs":[126],"efficient":[127],"fully":[128],"homomorphic":[129],"encryption":[130],"(FHE)":[131],"counterparts":[132],"core":[135],"algorithmic":[136],"building":[137],"blocks":[138],"We":[142],"conduct":[143],"extensive":[144],"experiments":[145],"on":[146],"8":[147],"tasks":[148],"evaluate":[150],"accuracy,":[152],"robustness,":[153],"efficiency":[155,177,192],"SecPE.":[157],"results":[159],"show":[160],"SecPE":[162,205],"maintains":[163],"high":[164],"clean":[165],"accuracy":[166],"offers":[168],"better":[169],"at":[171],"expense":[173],"merely":[175],"2.5%":[176],"overhead":[178],"compared":[179],"baseline":[181],"methods,":[184],"indicating":[185],"a":[186],"satisfactory":[187],"\u201caccuracy-robustness-efficiency\u201d":[188],"tradeoff.":[189],"For":[190],"encrypted":[195],"Argmax":[196],"operation":[197],"incurs":[199],"major":[200],"slowdown":[201],"ensembling,":[204],"is":[206],"35.4":[207],"times":[208],"faster":[209],"than":[210],"state-of-the-art":[212],"peers,":[213],"can":[215],"be":[216],"independent":[218],"interest":[219],"beyond":[220],"work.":[222]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
