{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:29:13Z","timestamp":1764588553605,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T00:00:00Z","timestamp":1720396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EU-NextGenerationEU through the Spanish government's Plan de Recuperaci\u00f3n, Transformaci\u00f3n y Resiliencia","award":["INCIBE's strategic SPRINT (Seguridad y Privacidad en Sistemas con Inteligencia Artificial) C063\/23"],"award-info":[{"award-number":["INCIBE's strategic SPRINT (Seguridad y Privacidad en Sistemas con Inteligencia Artificial) C063\/23"]}]},{"name":"EPSRC under grant SAIS: Secure AI assistantS","award":["EP\/T026723\/1"],"award-info":[{"award-number":["EP\/T026723\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,8]]},"DOI":"10.1145\/3640794.3665883","type":"proceedings-article","created":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T06:24:56Z","timestamp":1720333496000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Beyond Individual Concerns: Multi-user Privacy in Large Language Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1755-0976","authenticated-orcid":false,"given":"Xiao","family":"Zhan","sequence":"first","affiliation":[{"name":"Department of Informatics, King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0256-6740","authenticated-orcid":false,"given":"William","family":"Seymour","sequence":"additional","affiliation":[{"name":"Department of Informatics, Kings College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6041-178X","authenticated-orcid":false,"given":"Jose","family":"Such","sequence":"additional","affiliation":[{"name":"Department of Informatics, King's College London, United Kingdom and Universitat Politecnica de Valencia, Spain"}]}],"member":"320","published-online":{"date-parts":[[2024,7,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi, Kopo\u00a0M. Ramokapane, and Jose Such. 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, 451\u2013466. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/abdi"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22906-5_12"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502097"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581307"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581360"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0064"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179608"},{"key":"e_1_3_2_1_9_1","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS","author":"Bernd Julia","year":"2022","unstructured":"Julia Bernd, Ruba Abu-Salma, Junghyun Choy, and Alisa Frik. 2022. Balancing power dynamics in smart homes: nannies\u2019 perspectives on how cameras reflect and affect relationships. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 687\u2013706."},{"key":"e_1_3_2_1_10_1","volume-title":"Privacy: The Perspectives of Nannies on Smart Home Surveillance. In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)","author":"Bernd Julia","year":"2020","unstructured":"Julia Bernd, Ruba Abu-Salma, and Alisa Frik. 2020. { Bystanders\u2019} Privacy: The Perspectives of Nannies on Smart Home Surveillance. In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)."},{"volume-title":"Protecting Personal Identifiable Information with Azure AI. Retrieved","year":"2024","key":"e_1_3_2_1_11_1","unstructured":"Aaron\u00a0(Ari) Bornstein. 2020. Protecting Personal Identifiable Information with Azure AI. Retrieved January 2024 from https:\/\/medium.com\/microsoftazure\/protecting-personal-identifiable-information-with-azure-ai-aa4b7afc4839"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3534642"},{"key":"e_1_3_2_1_13_1","volume-title":"Quantifying memorization across neural language models. arXiv preprint arXiv:2202.07646","author":"Carlini Nicholas","year":"2022","unstructured":"Nicholas Carlini, Daphne Ippolito, Matthew Jagielski, Katherine Lee, Florian Tramer, and Chiyuan Zhang. 2022. Quantifying memorization across neural language models. arXiv preprint arXiv:2202.07646 (2022)."},{"key":"e_1_3_2_1_14_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Carlini Nicholas","year":"2021","unstructured":"Nicholas Carlini, Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, Ulfar Erlingsson, 2021. Extracting training data from large language models. In 30th USENIX Security Symposium (USENIX Security 21). 2633\u20132650."},{"key":"e_1_3_2_1_15_1","volume-title":"Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs. arXiv preprint arXiv:2105.10909","author":"Chen Chen","year":"2021","unstructured":"Chen Chen, Xuanli He, Lingjuan Lyu, and Fangzhao Wu. 2021. Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs. arXiv preprint arXiv:2105.10909 (2021)."},{"key":"e_1_3_2_1_16_1","volume-title":"Junqi Zhao, Weisheng Wang, Boyang Li, Pascale\u00a0N Fung, and Steven Hoi.","author":"Dai Wenliang","year":"2024","unstructured":"Wenliang Dai, Junnan Li, Dongxu Li, Anthony Meng\u00a0Huat Tiong, Junqi Zhao, Weisheng Wang, Boyang Li, Pascale\u00a0N Fung, and Steven Hoi. 2024. Instructblip: Towards general-purpose vision-language models with instruction tuning. Advances in Neural Information Processing Systems 36 (2024)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocw156"},{"key":"e_1_3_2_1_18_1","first-page":"20","article-title":"Risk perception and privacy regulation preferences from a cross-cultural perspective. A qualitative study among German and US smartphone users","volume":"13","author":"Dogruel Leyla","year":"2019","unstructured":"Leyla Dogruel and Sven Joeckel. 2019. Risk perception and privacy regulation preferences from a cross-cultural perspective. A qualitative study among German and US smartphone users. International Journal of Communication 13 (2019), 20.","journal-title":"International Journal of Communication"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_2_1_20_1","volume-title":"What Is the Eliza Effect?Retrieved","author":"Glover Ellen","year":"2024","unstructured":"Ellen Glover. 2023. What Is the Eliza Effect?Retrieved March 26, 2024 from https:\/\/builtin.com\/artificial-intelligence\/eliza-effect"},{"key":"e_1_3_2_1_21_1","volume-title":"think, and understand. arXiv preprint arXiv:2305.10790","author":"Gong Yuan","year":"2023","unstructured":"Yuan Gong, Hongyin Luo, Alexander\u00a0H Liu, Leonid Karlinsky, and James Glass. 2023. Listen, think, and understand. arXiv preprint arXiv:2305.10790 (2023)."},{"key":"e_1_3_2_1_22_1","volume-title":"Are Large Pre-Trained Language Models Leaking Your Personal Information?arXiv preprint arXiv:2205.12628","author":"Huang Jie","year":"2022","unstructured":"Jie Huang, Hanyin Shao, and Kevin Chen-Chuan Chang. 2022. Are Large Pre-Trained Language Models Leaking Your Personal Information?arXiv preprint arXiv:2205.12628 (2022)."},{"key":"e_1_3_2_1_23_1","volume-title":"Multi-user Smart Home. In USENIX Symposium on Usable Privacy and Security (SOUPS).","author":"Huang Yue","year":"2020","unstructured":"Yue Huang, Borke Obada-Obieh, and Konstantin Beznosov. 2020. End Users\u2019 Information-sharing Behaviours and Preferences within a Multi-user Smart Home. In USENIX Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360498"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1162\/dint_a_00119"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0272-4944(02)00087-7"},{"key":"e_1_3_2_1_27_1","volume-title":"Propile: Probing privacy leakage in large language models. arXiv preprint arXiv:2307.01881","author":"Kim Siwon","year":"2023","unstructured":"Siwon Kim, Sangdoo Yun, Hwaran Lee, Martin Gubri, Sungroh Yoon, and Seong\u00a0Joon Oh. 2023. Propile: Probing privacy leakage in large language models. arXiv preprint arXiv:2307.01881 (2023)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.323"},{"key":"e_1_3_2_1_29_1","volume-title":"Analyzing leakage of personally identifiable information in language models. arXiv preprint arXiv:2302.00539","author":"Lukas Nils","year":"2023","unstructured":"Nils Lukas, Ahmed Salem, Robert Sim, Shruti Tople, Lukas Wutschitz, and Santiago Zanella-B\u00e9guelin. 2023. Analyzing leakage of personally identifiable information in language models. arXiv preprint arXiv:2302.00539 (2023)."},{"key":"e_1_3_2_1_30_1","volume-title":"Retrieved","author":"Madden Mary","year":"2024","unstructured":"Mary Madden. 2014. Privacy Perceptions. Retrieved February 2024 from https:\/\/www.pewresearch.org\/internet\/2014\/11\/12\/privacy-perceptions\/"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0035"},{"key":"e_1_3_2_1_32_1","volume-title":"Transformative or not? How privacy violation experiences influence online privacy concerns and online information disclosure. Human communication research 47, 1","author":"Masur K","year":"2021","unstructured":"Philipp\u00a0K Masur and Sabine Trepte. 2021. Transformative or not? How privacy violation experiences influence online privacy concerns and online information disclosure. Human communication research 47, 1 (2021), 49\u201374."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00567"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450613.3456829"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/3463952.3464061"},{"key":"e_1_3_2_1_36_1","volume-title":"Navigating the security and privacy challenges of large language models. BUSINESS SECURITY. Retrieved","author":"Muncaster Phil","year":"2024","unstructured":"Phil Muncaster. 2023. Navigating the security and privacy challenges of large language models. BUSINESS SECURITY. Retrieved Feb 2024 from https:\/\/www.welivesecurity.com\/en\/business-security\/security-privacy-challenges-large-language-models\/"},{"key":"e_1_3_2_1_37_1","volume-title":"Scalable extraction of training data from (production) language models. arXiv preprint arXiv:2311.17035","author":"Nasr Milad","year":"2023","unstructured":"Milad Nasr, Nicholas Carlini, Jonathan Hayase, Matthew Jagielski, A\u00a0Feder Cooper, Daphne Ippolito, Christopher\u00a0A Choquette-Choo, Eric Wallace, Florian Tram\u00e8r, and Katherine Lee. 2023. Scalable extraction of training data from (production) language models. arXiv preprint arXiv:2311.17035 (2023)."},{"key":"e_1_3_2_1_38_1","volume-title":"The ELIZA effect: joseph Weizenbaum and the emergence of Chatbots. Deceitful media: artificial intelligence and social life after the Turing test","author":"Natale Simone","year":"2021","unstructured":"Simone Natale. 2021. The ELIZA effect: joseph Weizenbaum and the emergence of Chatbots. Deceitful media: artificial intelligence and social life after the Turing test (2021), 50\u201367."},{"key":"e_1_3_2_1_39_1","volume-title":"Protected Health Information filter (Philter): accurately and securely de-identifying free-text clinical notes. NPJ digital medicine 3, 1","author":"Norgeot Beau","year":"2020","unstructured":"Beau Norgeot, Kathleen Muenzen, Thomas\u00a0A Peterson, Xuancheng Fan, Benjamin\u00a0S Glicksberg, Gundolf Schenk, Eugenia Rutenberg, Boris Oskotsky, Marina Sirota, Jinoos Yazdany, 2020. Protected Health Information filter (Philter): accurately and securely de-identifying free-text clinical notes. NPJ digital medicine 3, 1 (2020), 57."},{"key":"e_1_3_2_1_40_1","volume-title":"The Effect of Privacy Perception on Social Media on Attitude Towards Social Media Usage. Ya\u015far \u00dcniversitesi E-Dergisi 17, 65","author":"Abd\u00fclkadir \u00d6ZT\u00dcRK, Co\u015fkun","year":"2022","unstructured":"Abd\u00fclkadir \u00d6ZT\u00dcRK, Co\u015fkun ERKAN, and Umut ERKU\u015e. 2022. The Effect of Privacy Perception on Social Media on Attitude Towards Social Media Usage. Ya\u015far \u00dcniversitesi E-Dergisi 17, 65 (2022), 79\u201394."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2019.2958914"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.5071532"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399358"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543513"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376585"},{"key":"e_1_3_2_1_46_1","volume-title":"Beyond memorization: Violating privacy via inference with large language models. arXiv preprint arXiv:2310.07298","author":"Staab Robin","year":"2023","unstructured":"Robin Staab, Mark Vero, Mislav Balunovi\u0107, and Martin Vechev. 2023. Beyond memorization: Violating privacy via inference with large language models. arXiv preprint arXiv:2310.07298 (2023)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3208039"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025668"},{"key":"e_1_3_2_1_49_1","unstructured":"Guangzhi Sun Wenyi Yu Changli Tang Xianzhao Chen Tian Tan Wei Li Lu Lu Zejun Ma and Chao Zhang. 2023. Fine-grained Audio-Visual Joint Representations for Multimodal Large Language Models. arxiv:2310.05863\u00a0[eess.AS]"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479858"},{"key":"e_1_3_2_1_51_1","volume-title":"SALMONN: Towards Generic Hearing Abilities for Large Language Models. arXiv: 2310.13289","author":"Tang Changli","year":"2023","unstructured":"Changli Tang, Wenyi Yu, Guangzhi Sun, Xianzhao Chen, Tian Tan, Wei Li, Lu Lu, Zejun Ma, and Chao Zhang. 2023. SALMONN: Towards Generic Hearing Abilities for Large Language Models. arXiv: 2310.13289 (2023)."},{"key":"e_1_3_2_1_52_1","volume-title":"ACCORD: Constraint-driven Mediation of Multi-user Conflicts in Cloud Services. In Companion Proceedings of the ACM on Web Conference","author":"Tippavajjula Abhiroop","year":"2024","unstructured":"Abhiroop Tippavajjula, Primal Pappachan, Anna Squicciarini, and Jose Such. 2024. ACCORD: Constraint-driven Mediation of Multi-user Conflicts in Cloud Services. In Companion Proceedings of the ACM on Web Conference 2024. 1039\u20131042."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0022"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546719"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207761"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025907"},{"key":"e_1_3_2_1_58_1","volume-title":"End User Security and Privacy Concerns with Smart Homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 65\u201380. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/zeng"},{"key":"e_1_3_2_1_59_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in { multi-user} smart homes: A design exploration and { in-home} user study. In 28th USENIX Security Symposium (USENIX Security 19). 159\u2013176."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3514094.3534129"},{"key":"e_1_3_2_1_61_1","volume-title":"European Conference on Artificial Intelligence. IOS Press.","author":"Zhan Xiao","year":"2023","unstructured":"Xiao Zhan, Stefan Sarkadi, and Jose Such. 2023. Privacy-enhanced Personal Assistants based on Dialogues and Case Similarity. In European Conference on Artificial Intelligence. IOS Press."},{"key":"e_1_3_2_1_62_1","volume-title":"Video-llama: An instruction-tuned audio-visual language model for video understanding. arXiv preprint arXiv:2306.02858","author":"Zhang Hang","year":"2023","unstructured":"Hang Zhang, Xin Li, and Lidong Bing. 2023. Video-llama: An instruction-tuned audio-visual language model for video understanding. arXiv preprint arXiv:2306.02858 (2023)."},{"key":"e_1_3_2_1_63_1","volume-title":"or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents. arXiv preprint arXiv:2309.11653","author":"Zhang Zhiping","year":"2023","unstructured":"Zhiping Zhang, Michelle Jia, Bingsheng Yao, Sauvik Das, Ada Lerner, Dakuo Wang, Tianshi Li, 2023. \" It\u2019s a Fair Game\u201d, or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents. arXiv preprint arXiv:2309.11653 (2023)."}],"event":{"name":"CUI '24: ACM Conversational User Interfaces 2024","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Luxembourg Luxembourg","acronym":"CUI '24"},"container-title":["ACM Conversational User Interfaces 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640794.3665883","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3640794.3665883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T18:03:18Z","timestamp":1755885798000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640794.3665883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,8]]},"references-count":63,"alternative-id":["10.1145\/3640794.3665883","10.1145\/3640794"],"URL":"https:\/\/doi.org\/10.1145\/3640794.3665883","relation":{},"subject":[],"published":{"date-parts":[[2024,7,8]]},"assertion":[{"value":"2024-07-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}