暂无分享,去创建一个
[1] Li Fei-Fei,et al. ImageNet: A large-scale hierarchical image database , 2009, CVPR.
[2] Lei Jiang,et al. HEMET: A Homomorphic-Encryption-Friendly Privacy-Preserving Mobile Neural Network Architecture , 2021, ICML.
[3] Farinaz Koushanfar,et al. XONN: XNOR-based Oblivious Deep Neural Network Inference , 2019, IACR Cryptol. ePrint Arch..
[4] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[5] David J. Wu,et al. CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[6] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[7] Meghan Cowan,et al. Porcupine: a synthesizing compiler for vectorized homomorphic encryption , 2021, PLDI.
[8] Ajith Suresh,et al. Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning , 2019, IACR Cryptol. ePrint Arch..
[9] Wen-jie Lu,et al. Falcon: Fast Spectral Inference on Encrypted Data , 2020, NeurIPS.
[10] Forrest N. Iandola,et al. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <1MB model size , 2016, ArXiv.
[11] Dan Boneh,et al. Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware , 2018, ICLR.
[12] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[13] Eyal Kushilevitz,et al. Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning , 2021, Proc. Priv. Enhancing Technol..
[14] Li Fei-Fei,et al. Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference , 2018, ArXiv.
[15] Sameer Wagh,et al. SecureNN: 3-Party Secure Computation for Neural Network Training , 2019, Proc. Priv. Enhancing Technol..
[16] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[17] Zahra Ghodsi,et al. CryptoNAS: Private Inference on a ReLU Budget , 2020, NeurIPS.
[18] Sharad Malik,et al. Morpheus: A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn , 2019, ASPLOS.
[19] L. Deng,et al. The MNIST Database of Handwritten Digit Images for Machine Learning Research [Best of the Web] , 2012, IEEE Signal Processing Magazine.
[20] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[21] Andy R. Terrel,et al. SymPy: Symbolic computing in Python , 2017, PeerJ Prepr..
[22] Hao Chen,et al. CHET: an optimizing compiler for fully-homomorphic neural-network inferencing , 2019, PLDI.
[23] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[24] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[25] Farinaz Koushanfar,et al. Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications , 2018, IACR Cryptol. ePrint Arch..
[26] Wei Dai,et al. EVA: an encrypted vector arithmetic language and compiler for efficient homomorphic computation , 2019, PLDI.
[27] Arpita Patra,et al. FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning , 2020, IACR Cryptol. ePrint Arch..
[28] Jie Lin,et al. The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs , 2018, IACR Cryptol. ePrint Arch..
[29] Thomas F. Wenisch,et al. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.
[30] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[31] Arpita Patra,et al. BLAZE: Blazing Fast Privacy-Preserving Machine Learning , 2020, IACR Cryptol. ePrint Arch..
[32] Farinaz Koushanfar,et al. DeepSecure: Scalable Provably-Secure Deep Learning , 2017, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[33] Brandon Reagen,et al. Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning , 2021, ArXiv.
[34] Ashish Choudhury,et al. ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction , 2019, IACR Cryptol. ePrint Arch..
[35] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[36] Kwang-Ting Cheng,et al. ReActNet: Towards Precise Binary Neural Network with Generalized Activation Functions , 2020, ECCV.
[37] Gerald Penn,et al. Efficient Evaluation of Activation Functions over Encrypted Data , 2019, 2019 IEEE Security and Privacy Workshops (SPW).
[38] Jong-Seon No,et al. Precise Approximation of Convolutional Neural Networks for Homomorphically Encrypted Data , 2021, IEEE Access.
[39] Shobha Venkataraman,et al. CrypTen: Secure Multi-Party Computation Meets Machine Learning , 2021, NeurIPS.
[40] Aseem Rastogi,et al. EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning , 2019, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
[41] Zahra Ghodsi,et al. Circa: Stochastic ReLUs for Private Deep Learning , 2021, NeurIPS.
[42] Murali Annavaram,et al. DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware , 2021, MICRO.
[43] Thomas Steinke,et al. Differential Privacy: A Primer for a Non-Technical Audience , 2018 .
[44] Adi Shamir,et al. How to share a secret , 1979, CACM.
[45] Aseem Rastogi,et al. CrypTFlow2: Practical 2-Party Secure Inference , 2020, IACR Cryptol. ePrint Arch..
[46] Lei Jiang,et al. AutoPrivacy: Automated Layer-wise Parameter Selection for Secure Neural Network Inference , 2020, NeurIPS.
[47] Peter Rindal,et al. ABY3: A Mixed Protocol Framework for Machine Learning , 2018, IACR Cryptol. ePrint Arch..
[48] Anantha Chandrakasan,et al. Gazelle: A Low Latency Framework for Secure Neural Network Inference , 2018, IACR Cryptol. ePrint Arch..
[49] Stanford,et al. Tiny ImageNet Classification with Convolutional Neural Networks , 2015 .
[50] Zahra Ghodsi,et al. DeepReDuce: ReLU Reduction for Fast Private Inference , 2021, ICML.
[51] Sergey Ioffe,et al. Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning , 2016, AAAI.
[52] Hongxia Jin,et al. SAFENet: A Secure, Accurate and Fast Neural Network Inference , 2021, ICLR.
[53] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[54] Farinaz Koushanfar,et al. On the Application of Binary Neural Networks in Oblivious Inference , 2021, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[55] Ittai Anati,et al. Innovative Technology for CPU Based Attestation and Sealing , 2013 .
[56] Yao Lu,et al. Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..
[57] Constance Morel,et al. Privacy-Preserving Classification on Deep Neural Network , 2017, IACR Cryptol. ePrint Arch..
[58] Marcel Keller,et al. Secure Evaluation of Quantized Neural Networks , 2019, IACR Cryptol. ePrint Arch..