Cryptographic Protocol

Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case

Authors: Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu, Umit Cali | Published: 2022-04-16
Privacy Enhancing Technology
Cryptographic Protocol
Machine Learning Method

Privacy-preserving Similarity Calculation of Speaker Features Using Fully Homomorphic Encryption

Authors: Yogachandran Rahulamathavan | Published: 2022-02-16 | Updated: 2022-03-14
Algorithm Design
User Authentication System
Cryptographic Protocol

SecGNN: Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service

Authors: Songlei Wang, Yifeng Zheng, Xiaohua Jia | Published: 2022-02-16 | Updated: 2023-01-31
Training Protocol
Privacy Enhancing Protocol
Cryptographic Protocol

Efficient Privacy Preserving Logistic Regression for Horizontally Distributed Data

Authors: Guanhong Miao | Published: 2022-02-05 | Updated: 2022-07-20
Privacy Enhancing Protocol
Robust Regression
Cryptographic Protocol

Training Differentially Private Models with Secure Multiparty Computation

Authors: Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson Nascimento, Martine De Cock | Published: 2022-02-05 | Updated: 2022-09-01
Training Protocol
Privacy Enhancing Protocol
Cryptographic Protocol

Linear Model Against Malicious Adversaries with Local Differential Privacy

Authors: Guanhong Miao, A. Adam Ding, Samuel S. Wu | Published: 2022-02-05 | Updated: 2022-06-29
Privacy Enhancing Protocol
Poisoning
Cryptographic Protocol

An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications

Authors: Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Shoko Imaizumi, Sayaka Shiota | Published: 2022-01-26 | Updated: 2022-04-16
Privacy Enhancing Protocol
Cryptographic Protocol
Image Feature Extraction

Scalable Privacy-Preserving Distributed Learning

Authors: David Froelicher, Juan R. Troncoso-Pastoriza, Apostolos Pyrgelis, Sinem Sav, Joao Sa Sousa, Jean-Philippe Bossuat, Jean-Pierre Hubaux | Published: 2020-05-19 | Updated: 2021-07-14
Privacy Assessment
Multi-Party Computation
Cryptographic Protocol

A Deep Learning Based Attack for The Chaos-based Image Encryption

Authors: Chen He, Kan Ming, Yongwei Wang, Z. Jane Wang | Published: 2019-07-29
Data Protection Method
Loss Function
Cryptographic Protocol

Distributed and Secure ML with Self-tallying Multi-party Aggregation

Authors: Yunhui Long, Tanmay Gangwani, Haris Mughees, Carl Gunter | Published: 2018-11-26
Model Performance Evaluation
Secure Arithmetic Computation
Cryptographic Protocol