PPFL: privacy-preserving federated learning with trusted execution environments
暂无分享,去创建一个
Diego Perino | Hamed Haddadi | Kleomenis Katevas | Nicolas Kourtellis | Eduard Marin | Fan Mo | H. Haddadi | Kleomenis Katevas | Diego Perino | N. Kourtellis | Fan Mo | Eduard Marin
[1] Andrew Paverd,et al. Modelling and Automatically Analysing Privacy Properties for Honest-but-Curious Adversaries , 2014 .
[2] Yoshua Bengio,et al. Exploring Strategies for Training Deep Neural Networks , 2009, J. Mach. Learn. Res..
[3] Tianjian Chen,et al. A Secure Federated Transfer Learning Framework , 2020, IEEE Intelligent Systems.
[4] Diego Perino,et al. FLaaS: Federated Learning as a Service , 2020, DistributedML@CoNEXT.
[5] Sebastian Nowozin,et al. Oblivious Multi-Party Machine Learning on Trusted Processors , 2016, USENIX Security Symposium.
[6] Anit Kumar Sahu,et al. Federated Optimization in Heterogeneous Networks , 2018, MLSys.
[7] Richard Nock,et al. Advances and Open Problems in Federated Learning , 2021, Found. Trends Mach. Learn..
[8] Valerio Schiavoni,et al. On The Performance of ARM TrustZone , 2019, ArXiv.
[9] Albert Y. Zomaya,et al. An Efficiency-Boosting Client Selection Scheme for Federated Learning With Fairness Guarantee , 2020, IEEE Transactions on Parallel and Distributed Systems.
[10] Linus Karlsson,et al. Trust Anchors in Software Defined Networks , 2018, ESORICS.
[11] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[12] Song Han,et al. Deep Leakage from Gradients , 2019, NeurIPS.
[13] Michael Moeller,et al. Inverting Gradients - How easy is it to break privacy in federated learning? , 2020, NeurIPS.
[14] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[15] Gautam Kamath,et al. Enabling Fast Differentially Private SGD via Just-in-Time Compilation and Vectorization , 2020, NeurIPS.
[16] Daniel Gruss,et al. PLATYPUS: Software-based Power Side-Channel Attacks on x86 , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[17] Blaise Agüera y Arcas,et al. Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.
[18] Michael Eickenberg,et al. Greedy Layerwise Learning Can Scale to ImageNet , 2018, ICML.
[19] Tianlong Chen,et al. L2-GCN: Layer-Wise and Learned Efficient Training of Graph Convolutional Networks , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[20] Hamed Haddadi,et al. DarkneTZ: towards model privacy at the edge using trusted execution environments , 2020, MobiSys.
[21] Qi Li,et al. Enabling Execution Assurance of Federated Learning at Untrusted Participants , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications.
[22] Somesh Jha,et al. Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting , 2017, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[23] Farinaz Koushanfar,et al. A Taxonomy of Attacks on Federated Learning , 2021, IEEE Security & Privacy.
[24] Hugo Krawczyk,et al. SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols , 2003, CRYPTO.
[25] Sarvar Patel,et al. Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..
[26] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[27] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[28] Vitaly Shmatikov,et al. Differential Privacy Has Disparate Impact on Model Accuracy , 2019, NeurIPS.
[29] Jinyuan Jia,et al. Local Model Poisoning Attacks to Byzantine-Robust Federated Learning , 2019, USENIX Security Symposium.
[30] Wei Feng,et al. SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE , 2019, CCS.
[31] Tassilo Klein,et al. Differentially Private Federated Learning: A Client Level Perspective , 2017, ArXiv.
[32] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[33] Qiang Yang,et al. A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.
[34] Deborah Estrin,et al. Policy-Based Federated Learning , 2020 .
[35] Cordelia Schmid,et al. White-box vs Black-box: Bayes Optimal Strategies for Membership Inference , 2019, ICML.
[36] Mohamed Ali Kaafar,et al. Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning , 2020, CCSW@CCS.
[37] Simha Sethumadhavan,et al. Heterogeneous Isolated Execution for Commodity GPUs , 2019, ASPLOS.
[38] Flavio D. Garcia,et al. VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface , 2021, USENIX Security Symposium.
[39] Zhipeng Jia,et al. Telekine: Secure Computing with Cloud GPUs , 2020, NSDI.
[40] Tudor Dumitras,et al. Shallow-Deep Networks: Understanding and Mitigating Network Overthinking , 2018, ICML.
[41] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[42] Vitaly Shmatikov,et al. Exploiting Unintended Feature Leakage in Collaborative Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[43] Hubert Eichner,et al. Towards Federated Learning at Scale: System Design , 2019, SysML.
[44] Vitaly Shmatikov,et al. Chiron: Privacy-preserving Machine Learning as a Service , 2018, ArXiv.
[45] Amir Houmansadr,et al. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[46] Hamed Haddadi,et al. Layer-wise Characterization of Latent Information Leakage in Federated Learning , 2020, ArXiv.
[47] Srinivas Devadas,et al. Intel SGX Explained , 2016, IACR Cryptol. ePrint Arch..
[48] H. Brendan McMahan,et al. Learning Differentially Private Recurrent Language Models , 2017, ICLR.
[49] Yasaman Khazaeni,et al. Federated Learning with Matched Averaging , 2020, ICLR.
[50] David Evans,et al. Evaluating Differentially Private Machine Learning in Practice , 2019, USENIX Security Symposium.
[51] Brent Byunghoon Kang,et al. Hacking in Darkness: Return-oriented Programming against Secure Enclaves , 2017, USENIX Security Symposium.
[52] Frank Piessens,et al. A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes , 2019, CCS.
[53] Takayuki Nishio,et al. Client Selection for Federated Learning with Heterogeneous Resources in Mobile Edge , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[54] Ananda Theertha Suresh,et al. Can You Really Backdoor Federated Learning? , 2019, ArXiv.
[55] Dimitrios Pendarakis,et al. YerbaBuena: Securing Deep Learning Inference Data via Enclave-based Ternary Model Partitioning , 2018 .
[56] Hamed Haddadi,et al. Efficient and Private Federated Learning using TEE , 2019 .
[57] Alaa Sagheer,et al. Unsupervised Pre-training of a Deep LSTM-based Stacked Autoencoder for Multivariate Time Series Forecasting Problems , 2019, Scientific Reports.
[58] Gavriel Salomon,et al. T RANSFER OF LEARNING , 1992 .
[59] Farinaz Koushanfar,et al. DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks , 2019, 2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA).
[60] Dan Boneh,et al. Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware , 2018, ICLR.
[61] Mark Sandler,et al. MobileNetV2: Inverted Residuals and Linear Bottlenecks , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[62] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[63] Samy Bengio,et al. Revisiting Distributed Synchronous SGD , 2016, ArXiv.
[64] Yoshua Bengio,et al. Greedy Layer-Wise Training of Deep Networks , 2006, NIPS.
[65] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[66] Li Lei,et al. Integrating Remote Attestation with Transport Layer Security , 2018, ArXiv.
[67] Christos Gkantsidis,et al. VC3: Trustworthy Data Analytics in the Cloud Using SGX , 2015, 2015 IEEE Symposium on Security and Privacy.
[68] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[69] Vitaly Shmatikov,et al. How To Backdoor Federated Learning , 2018, AISTATS.
[70] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[71] Giuseppe Ateniese,et al. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.