暂无分享,去创建一个
Jong-Seon No | Joon-Woo Lee | Junghyun Lee | Eunsang Lee | Yongjune Kim | Young-Sik Kim | Jong-Seon No | Yongjune Kim | Joon-Woo Lee | Eunsang Lee | Junghyun Lee | Young-Sik Kim
[1] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[2] Jean-Pierre Hubaux,et al. Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys , 2020, IACR Cryptol. ePrint Arch..
[3] Giorgio Patrini,et al. SEALion: a Framework for Neural Network Inference on Encrypted Data , 2019, ArXiv.
[4] Jakub Konecný,et al. Federated Optimization: Distributed Optimization Beyond the Datacenter , 2015, ArXiv.
[5] Jong-Seon No,et al. Optimal Minimax Polynomial Approximation of Modular Reduction for Bootstrapping of Approximate Homomorphic Encryption , 2020, IACR Cryptol. ePrint Arch..
[6] Jong-Seon No,et al. High-Precision Approximate Homomorphic Encryption by Error Variance Minimization , 2020, IACR Cryptol. ePrint Arch..
[7] Zhuowen Tu,et al. Aggregated Residual Transformations for Deep Neural Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[8] Jung Hee Cheon,et al. A Full RNS Variant of Approximate Homomorphic Encryption , 2018, IACR Cryptol. ePrint Arch..
[9] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[10] Constance Morel,et al. Privacy-Preserving Classification on Deep Neural Network , 2017, IACR Cryptol. ePrint Arch..
[11] Jie Lin,et al. The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs , 2018, IACR Cryptol. ePrint Arch..
[12] Hsien-Hsin S. Lee,et al. Cheetah: Optimizing and Accelerating Homomorphic Encryption for Private Inference , 2020, 2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA).
[13] Hassan Takabi,et al. Deep Neural Networks Classification over Encrypted Data , 2019, CODASPY.
[14] Anantha Chandrakasan,et al. Gazelle: A Low Latency Framework for Secure Neural Network Inference , 2018, IACR Cryptol. ePrint Arch..
[15] Lei Jiang,et al. SHE: A Fast and Accurate Deep Neural Network for Encrypted Data , 2019, NeurIPS.
[16] Jung Hee Cheon,et al. Efficient Homomorphic Comparison Methods with Optimal Complexity , 2019, IACR Cryptol. ePrint Arch..
[17] Jong-Seon No,et al. High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function , 2021, EUROCRYPT.
[18] Larry J. Stockmeyer,et al. On the Number of Nonscalar Multiplications Necessary to Evaluate Polynomials , 1973, SIAM J. Comput..
[19] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[20] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[21] Li Fei-Fei,et al. Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference , 2018, ArXiv.
[22] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[23] Jung Hee Cheon,et al. Homomorphic Encryption for Arithmetic of Approximate Numbers , 2017, ASIACRYPT.
[24] Yixing Lao,et al. nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data , 2018, IACR Cryptol. ePrint Arch..
[25] Jong-Seon No,et al. Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison , 2022, IEEE Transactions on Dependable and Secure Computing.
[26] Jung Hee Cheon,et al. Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs , 2021, IACR Cryptol. ePrint Arch..
[27] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[28] Antonis Papadimitriou,et al. Approximate Homomorphic Encryption with Reduced Approximation Error , 2020, IACR Cryptol. ePrint Arch..
[29] Nicolas Gama,et al. TFHE: Fast Fully Homomorphic Encryption Over the Torus , 2019, Journal of Cryptology.
[30] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[31] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[32] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[33] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[34] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.