BUNET: Blind Medical Image Segmentation Based on Secure UNET
暂无分享,去创建一个
Xiaowei Xu | Takashi Sato | Weiwen Jiang | Yiyu Shi | Song Bian | Takashi Sato | Yiyu Shi | Xiaowei Xu | S. Bian | Weiwen Jiang
[1] Marcel Keller,et al. Overdrive: Making SPDZ Great Again , 2018, IACR Cryptol. ePrint Arch..
[2] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[3] S. Lifchez,et al. Electronic Communication of Protected Health Information: Privacy, Security, and HIPAA Compliance. , 2017, The Journal of hand surgery.
[4] Julien Cohen-Adad,et al. Spinal cord grey matter segmentation challenge , 2017, NeuroImage.
[5] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[6] S. Hoffman,et al. Securing the HIPAA Security Rule , 2006 .
[7] Polina Golland,et al. Interactive Whole-Heart Segmentation in Congenital Heart Disease , 2015, MICCAI.
[8] Zvika Brakerski,et al. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.
[9] Takashi Sato,et al. NASS: Optimizing Secure Inference via Neural Architecture Search , 2020, ECAI.
[10] Takashi Sato,et al. ENSEI: Efficient Secure Inference via Frequency-Domain Homomorphic Convolution for Privacy-Preserving Visual Recognition , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[11] Farinaz Koushanfar,et al. XONN: XNOR-based Oblivious Deep Neural Network Inference , 2019, IACR Cryptol. ePrint Arch..
[12] Thomas Brox,et al. U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.
[13] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[14] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[15] Ran Gilad-Bachrach,et al. Low Latency Privacy Preserving Inference , 2018, ICML.
[16] Farinaz Koushanfar,et al. DeepSecure: Scalable Provably-Secure Deep Learning , 2017, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[17] Ivan Damgård,et al. On the Communication Required for Unconditionally Secure Multiplication , 2016, CRYPTO.
[18] Anantha Chandrakasan,et al. Gazelle: A Low Latency Framework for Secure Neural Network Inference , 2018, IACR Cryptol. ePrint Arch..
[19] Jung Hee Cheon,et al. Homomorphic Encryption for Arithmetic of Approximate Numbers , 2017, ASIACRYPT.
[20] Yao Lu,et al. Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..
[21] A. Cardona,et al. An Integrated Micro- and Macroarchitectural Analysis of the Drosophila Brain by Computer-Assisted Serial Section Electron Microscopy , 2010, PLoS biology.
[22] Donald Beaver,et al. Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.