暂无分享,去创建一个
Yongqin Wang | Murali Annavaram | Krishna Giri Narra | Zhifeng Lin | Keshav Balasubramaniam | M. Annavaram | Krishnagiri Narra | Zhifeng Lin | Yongqin Wang | Keshav Balasubramaniam
[1] Trevor N. Mudge,et al. Neurosurgeon: Collaborative Intelligence Between the Cloud and Mobile Edge , 2017, ASPLOS.
[2] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[3] Andrea Vedaldi,et al. Understanding deep image representations by inverting them , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[4] Alec Wolman,et al. MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.
[5] Ashish Khetan,et al. PacGAN: The Power of Two Samples in Generative Adversarial Networks , 2017, IEEE Journal on Selected Areas in Information Theory.
[6] Josep Torrellas,et al. InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy , 2018, 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[7] Jie Lin,et al. The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs , 2018, IACR Cryptol. ePrint Arch..
[8] Philip S. Yu,et al. Not Just Privacy: Improving Performance of Private Deep Learning in Mobile Cloud , 2018, KDD.
[9] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[10] Thomas F. Wenisch,et al. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.
[11] Guoping Wang,et al. X-GANs: Image Reconstruction Made Easy for Extreme Cases , 2018, ArXiv.
[12] David Pointcheval,et al. Partially Encrypted Machine Learning using Functional Encryption , 2019, NeurIPS 2019.
[13] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[14] Thomas Brox,et al. Inverting Convolutional Networks with Convolutional Networks , 2015, ArXiv.
[15] Michael Hamburg,et al. Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[16] Yao Lu,et al. Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..
[17] Dimitrios Pendarakis,et al. Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution , 2018, ArXiv.
[18] Yoshua Bengio,et al. Generative Adversarial Networks , 2014, ArXiv.
[19] T. Alves,et al. TrustZone : Integrated Hardware and Software Security , 2004 .
[20] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[21] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[22] Yuan Xiao,et al. SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution , 2018, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
[23] Srinivas Devadas,et al. Sanctum: Minimal Hardware Extensions for Strong Software Isolation , 2016, USENIX Security Symposium.
[24] Byung-Gon Chun,et al. CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.
[25] Anantha Chandrakasan,et al. Gazelle: A Low Latency Framework for Secure Neural Network Inference , 2018, IACR Cryptol. ePrint Arch..
[26] Srinivas Devadas,et al. Intel SGX Explained , 2016, IACR Cryptol. ePrint Arch..
[27] Josep Torrellas,et al. Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data , 2019, IEEE Micro.
[28] Xu Chen,et al. COMET: Code Offload by Migrating Execution Transparently , 2012, OSDI.
[29] Michael Hamburg,et al. Meltdown , 2018, meltdownattack.com.
[30] Dan Boneh,et al. Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware , 2018, ICLR.
[31] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[32] Hassan Takabi,et al. CryptoDL: Deep Neural Networks over Encrypted Data , 2017, ArXiv.
[33] Simon Osindero,et al. Conditional Generative Adversarial Nets , 2014, ArXiv.
[34] Fei-Fei Li,et al. ImageNet: A large-scale hierarchical image database , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[35] Hadi Esmaeilzadeh,et al. Shredder: Learning Noise Distributions to Protect Inference Privacy , 2020, ASPLOS.
[36] Ramesh Govindan,et al. Odessa: enabling interactive perception applications on mobile devices , 2011, MobiSys '11.