EPIC: Efficient Private Image Classification (or: Learning from the Masters)
暂无分享,去创建一个
Frederik Vercauteren | Dragos Rotaru | Nigel P. Smart | Eleftheria Makri | N. Smart | F. Vercauteren | Dragos Rotaru | Eleftheria Makri
[1] Petros Drineas,et al. On the Nyström Method for Approximating a Gram Matrix for Improved Kernel-Based Learning , 2005, J. Mach. Learn. Res..
[2] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[3] Yoshua Bengio,et al. How transferable are features in deep neural networks? , 2014, NIPS.
[4] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[5] Kilian Q. Weinberger,et al. Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[6] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[7] Marcel Keller,et al. Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits , 2013, ESORICS.
[8] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[9] Atsuto Maki,et al. Factors of Transferability for a Generic ConvNet Representation , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[10] Antonio Torralba,et al. Recognizing indoor scenes , 2009, CVPR.
[11] Constance Morel,et al. Privacy-Preserving Classification on Deep Neural Network , 2017, IACR Cryptol. ePrint Arch..
[12] Pietro Perona,et al. Learning Generative Visual Models from Few Training Examples: An Incremental Bayesian Approach Tested on 101 Object Categories , 2004, 2004 Conference on Computer Vision and Pattern Recognition Workshop.
[13] Taneli Mielikäinen,et al. Cryptographically private support vector machines , 2006, KDD '06.
[14] Muttukrishnan Rajarajan,et al. Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud , 2014, IEEE Transactions on Dependable and Secure Computing.
[15] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[16] Rong Jin,et al. Nyström Method vs Random Fourier Features: A Theoretical and Empirical Comparison , 2012, NIPS.
[17] Shuguo Han,et al. Privacy Preserving Support Vector Machine Using Non-linear Kernels on Hadoop Mahout , 2013, 2013 IEEE 16th International Conference on Computational Science and Engineering.
[18] Fan Zhang,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[19] Farinaz Koushanfar,et al. DeepSecure: Scalable Provably-Secure Deep Learning , 2017, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[20] Sebastian Thrun,et al. Is Learning The n-th Thing Any Easier Than Learning The First? , 1995, NIPS.
[21] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[22] Benjamin Recht,et al. Weighted Sums of Random Kitchen Sinks: Replacing minimization with randomization in learning , 2008, NIPS.
[23] Xavier Gastaldi,et al. Shake-Shake regularization , 2017, ArXiv.
[24] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[25] Michael Felsberg,et al. Scale coding bag of deep features for human attribute and action recognition , 2016, Machine Vision and Applications.
[26] Jaideep Vaidya,et al. Knowledge and Information Systems , 2007 .
[27] Mauro Barni,et al. Oblivious Neural Network Computing via Homomorphic Encryption , 2007, EURASIP J. Inf. Secur..
[28] Michael Naehrig,et al. ML Confidential: Machine Learning on Encrypted Data , 2012, ICISC.
[29] Fei-Fei Li,et al. ImageNet: A large-scale hierarchical image database , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[30] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[31] Trevor Darrell,et al. DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition , 2013, ICML.
[32] Mauro Barni,et al. A privacy-preserving protocol for neural-network-based computation , 2006, MM&Sec '06.
[33] Benjamin Recht,et al. Random Features for Large-Scale Kernel Machines , 2007, NIPS.
[34] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[35] Marcel Keller,et al. Overdrive: Making SPDZ Great Again , 2018, IACR Cryptol. ePrint Arch..
[36] A. Azzouz. 2011 , 2020, City.
[37] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[38] Yao Lu,et al. Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..
[39] Melissa Chase,et al. Private Collaborative Neural Network Learning , 2017, IACR Cryptol. ePrint Arch..
[40] Trevor Darrell,et al. Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.
[41] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[42] Ivan Damgård,et al. Confidential Benchmarking Based on Multiparty Computation , 2016, Financial Cryptography.
[43] Farinaz Koushanfar,et al. Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications , 2018, IACR Cryptol. ePrint Arch..
[44] Jian Sun,et al. Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[45] Matthias W. Seeger,et al. Using the Nyström Method to Speed Up Kernel Machines , 2000, NIPS.
[46] Anantha Chandrakasan,et al. Gazelle: A Low Latency Framework for Secure Neural Network Inference , 2018, IACR Cryptol. ePrint Arch..
[47] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[48] Ming-Syan Chen,et al. Privacy-preserving outsourcing support vector machines with random transformation , 2010, KDD.
[49] Michael Simpson,et al. Image Classification using non-linear Support Vector Machines on Encrypted Data , 2017, IACR Cryptol. ePrint Arch..
[50] Xiaoou Tang,et al. A large-scale car dataset for fine-grained categorization and verification , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[51] Ming-Syan Chen,et al. On the Design and Analysis of the Privacy-Preserving SVM Classifier , 2011, IEEE Transactions on Knowledge and Data Engineering.
[52] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[53] Stefan Carlsson,et al. CNN Features Off-the-Shelf: An Astounding Baseline for Recognition , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[54] Louis J. M. Aslett,et al. Encrypted statistical machine learning: new privacy preserving methods , 2015, ArXiv.
[55] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[56] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..