Vessels: efficient and scalable deep learning prediction on trusted processors
暂无分享,去创建一个
Xiao Yu | Haifeng Chen | Kyungtae Kim | Chung Hwan Kim | Byoungyoung Lee | Dave (Jing) Tian | Junghwan "John" Rhee | D. Tian | Kyungtae Kim | C. Kim | J. Rhee | Byoungyoung Lee | Haifeng Chen | Xiao Yu
[1] Somesh Jha,et al. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing , 2014, USENIX Security Symposium.
[2] Wen-Chuan Lee,et al. Trojaning Attack on Neural Networks , 2018, NDSS.
[3] Trevor N. Mudge,et al. Neurosurgeon: Collaborative Intelligence Between the Cloud and Mobile Edge , 2017, ASPLOS.
[4] Klaus-Robert Müller,et al. Compact and Computationally Efficient Representation of Deep Neural Networks , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[5] Yalin Chen,et al. Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, IACR Cryptol. ePrint Arch..
[6] Dan Boneh,et al. Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware , 2018, ICLR.
[7] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[8] Yuan Xiao,et al. SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution , 2018, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
[9] Flavio D. Garcia,et al. Plundervolt: Software-based Fault Injection Attacks against Intel SGX , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[10] Valerio Schiavoni,et al. Everything You Should Know About Intel SGX Performance on Virtualized Systems , 2019, Proc. ACM Meas. Anal. Comput. Syst..
[11] Zhuowen Tu,et al. Aggregated Residual Transformations for Deep Neural Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[12] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[13] Donald E. Porter,et al. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX , 2017, USENIX Annual Technical Conference.
[14] Li Shuangfeng,et al. TensorFlow Lite: On-Device Machine Learning Framework , 2020 .
[15] Christof Fetzer,et al. TensorSCONE: A Secure TensorFlow Framework using Intel SGX , 2019, ArXiv.
[16] Dimitrios Pendarakis,et al. YerbaBuena: Securing Deep Learning Inference Data via Enclave-based Ternary Model Partitioning , 2018 .
[17] Rajeev Balasubramonian,et al. VAULT: Reducing Paging Overheads in SGX with Efficient Integrity Verification Structures , 2018, ASPLOS.
[18] Sebastian Nowozin,et al. Oblivious Multi-Party Machine Learning on Trusted Processors , 2016, USENIX Security Symposium.
[19] Chao Sun,et al. Robustness of Neural Networks against Storage Media Errors , 2017, ArXiv.
[20] Tudor Dumitras,et al. Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks , 2019, USENIX Security Symposium.
[21] Carlos V. Rozas,et al. Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave , 2016, HASP 2016.
[22] Bo Chen,et al. Quantization and Training of Neural Networks for Efficient Integer-Arithmetic-Only Inference , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[23] Robert J. Walls,et al. Confidential Deep Learning: Executing Proprietary Models on Untrusted Devices , 2019, ArXiv.
[24] Mona Vij,et al. Scaling Intel® Software Guard Extensions Applications with Intel® SGX Card , 2019, HASP@ISCA.
[25] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[26] David M. Eyers,et al. Glamdring: Automatic Application Partitioning for Intel SGX , 2017, USENIX ATC.
[27] Michael Carbin,et al. The Lottery Ticket Hypothesis: Finding Sparse, Trainable Neural Networks , 2018, ICLR.
[28] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[29] Song Han,et al. Learning both Weights and Connections for Efficient Neural Network , 2015, NIPS.
[30] Mark Silberstein,et al. Eleos: ExitLess OS Services for SGX Enclaves , 2017, EuroSys.
[31] Ali Farhadi,et al. YOLOv3: An Incremental Improvement , 2018, ArXiv.
[32] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[33] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[34] David M. Eyers,et al. SCONE: Secure Linux Containers with Intel SGX , 2016, OSDI.
[35] Trevor Darrell,et al. Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.
[36] Kilian Q. Weinberger,et al. Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[37] Shweta Shinde,et al. Privado: Practical and Secure DNN Inference , 2018, ArXiv.
[38] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[39] Srinivas Devadas,et al. Intel SGX Explained , 2016, IACR Cryptol. ePrint Arch..
[40] Andrew Baumann,et al. Autarky: closing controlled channels with self-paging enclaves , 2020, EuroSys.
[41] Dirk Merkel,et al. Docker: lightweight Linux containers for consistent development and deployment , 2014 .
[42] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[43] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[44] Murat Kantarcioglu,et al. SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors , 2017, CCS.