暂无分享,去创建一个
[1] Ran El-Yaniv,et al. Binarized Neural Networks , 2016, NIPS.
[2] Paolo Favaro,et al. Unsupervised Learning of Visual Representations by Solving Jigsaw Puzzles , 2016, ECCV.
[3] Anantha Chandrakasan,et al. Gazelle: A Low Latency Framework for Secure Neural Network Inference , 2018, IACR Cryptol. ePrint Arch..
[4] Alexei A. Efros,et al. Context Encoders: Feature Learning by Inpainting , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[5] Daan Wierstra,et al. Stochastic Backpropagation and Approximate Inference in Deep Generative Models , 2014, ICML.
[6] Li Fei-Fei,et al. Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference , 2018, ArXiv.
[7] Yee Whye Teh,et al. The Concrete Distribution: A Continuous Relaxation of Discrete Random Variables , 2016, ICLR.
[8] Max Welling,et al. Auto-Encoding Variational Bayes , 2013, ICLR.
[9] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[10] Rachel Player,et al. Simple Encrypted Arithmetic Library-SEAL , 2017 .
[11] Satyanarayana V. Lokam,et al. SECURITY OF HOMOMORPHIC ENCRYPTION , 2017 .
[12] Simon Haykin,et al. GradientBased Learning Applied to Document Recognition , 2001 .
[13] Nicolas Gama,et al. Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds , 2016, ASIACRYPT.
[14] Max Welling,et al. Semi-supervised Learning with Deep Generative Models , 2014, NIPS.
[15] Morten Dahl,et al. Private Machine Learning in TensorFlow using Secure Computation , 2018, ArXiv.
[16] Igor Kononenko,et al. Machine learning for medical diagnosis: history, state of the art and perspective , 2001, Artif. Intell. Medicine.
[17] Yoshua Bengio,et al. Estimating or Propagating Gradients Through Stochastic Neurons for Conditional Computation , 2013, ArXiv.
[18] Yoshua Bengio,et al. Deep Learning of Representations for Unsupervised and Transfer Learning , 2011, ICML Unsupervised and Transfer Learning.
[19] Frederik Vercauteren,et al. EPIC: Efficient Private Image Classification (or: Learning from the Masters) , 2019, CT-RSA.
[20] Hao Chen,et al. CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs , 2018, ArXiv.
[21] Richard Nock,et al. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption , 2017, ArXiv.
[22] Michael Naehrig,et al. Manual for Using Homomorphic Encryption for Bioinformatics , 2017, Proceedings of the IEEE.
[23] Frederik Vercauteren,et al. Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.
[24] Varun Kanade,et al. TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service , 2018, ICML.
[25] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[26] Gregory Cohen,et al. EMNIST: an extension of MNIST to handwritten letters , 2017, CVPR 2017.
[27] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[28] Pascal Paillier,et al. Fast Homomorphic Evaluation of Deep Discretized Neural Networks , 2018, IACR Cryptol. ePrint Arch..
[29] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[30] Michael Naehrig,et al. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme , 2013, IMACC.
[31] Daniel Rueckert,et al. A generic framework for privacy preserving deep learning , 2018, ArXiv.
[32] Max Welling,et al. Learning Sparse Neural Networks through L0 Regularization , 2017, ICLR.