943 research outputs found
Intertwining Order Preserving Encryption and Differential Privacy
Ciphertexts of an order-preserving encryption (OPE) scheme preserve the order
of their corresponding plaintexts. However, OPEs are vulnerable to inference
attacks that exploit this preserved order. At another end, differential privacy
has become the de-facto standard for achieving data privacy. One of the most
attractive properties of DP is that any post-processing (inferential)
computation performed on the noisy output of a DP algorithm does not degrade
its privacy guarantee. In this paper, we intertwine the two approaches and
propose a novel differentially private order preserving encryption scheme,
OP. Under OP, the leakage of order from the ciphertexts is
differentially private. As a result, in the least, OP ensures a
formal guarantee (specifically, a relaxed DP guarantee) even in the face of
inference attacks. To the best of our knowledge, this is the first work to
intertwine DP with a property-preserving encryption scheme. We demonstrate
OP's practical utility in answering range queries via extensive
empirical evaluation on four real-world datasets. For instance, OP
misses only around in every correct records on average for a dataset
of size with an attribute of domain size and
A Survey on Effective Invocation Methods of Massive LLM Services
Language models as a service (LMaaS) enable users to accomplish tasks without
requiring specialized knowledge, simply by paying a service provider. However,
numerous providers offer massive large language model (LLM) services with
variations in latency, performance, and pricing. Consequently, constructing the
cost-saving LLM services invocation strategy with low-latency and
high-performance responses that meet specific task demands becomes a pressing
challenge. This paper provides a comprehensive overview of the LLM services
invocation methods. Technically, we give a formal definition of the problem of
constructing effective invocation strategy in LMaaS and present the LLM
services invocation framework. The framework classifies existing methods into
four different components, including input abstract, semantic cache, solution
design, and output enhancement, which can be freely combined with each other.
Finally, we emphasize the open challenges that have not yet been well addressed
in this task and shed light on future research
A New Caspase-8 Isoform Caspase-8s Increased Sensitivity to Apoptosis in Jurkat Cells
Caspase-8 is a key initiator of death receptor-induced apoptosis. Here we report a novel short isoform of caspase-8 (caspase-8s), which encodes the first (Death Effector Domain) DED and part of the second DED, missing the C-terminal caspase domain. In vivo binding assays showed that transfected caspase-8s bound to (Fas-associated death domain protein) FADD, the adaptor protein in (death-induced signal complex) DISC. To investigate the potential effects of caspase-8s on cell apoptosis, Jurkat cells were stably transfected with caspase-8s. Overexpression of caspase-8s increased sensitivity to the apoptotic stimuli, Fas-agonistic antibody CH11. These results suggest that caspase-8s may act as a promoter of apoptosis through binding to FADD and is involved in the regulation of apoptosis. In addition, the results also indicate that the first DED was an important structure mediating combination between caspase-8 and FADD
- …