Cryptographic Protocol

Compressible and Learnable Encryption for Untrusted Cloud Environments

Authors: Hitoshi Kiya | Published: 2018-11-26
Challenges in IT Security
Robustness Improvement
Cryptographic Protocol

A Fully Private Pipeline for Deep Learning on Electronic Health Records

Authors: Edward Chou, Thao Nguyen, Josh Beal, Albert Haque, Li Fei-Fei | Published: 2018-11-25
Watermarking Settings for Medical Data
Differential Privacy
Cryptographic Protocol

FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions

Authors: Shaohua Li, Kaiping Xue, Chenkai Ding, Xindi Gao, David S L Wei, Tao Wan, Feng Wu | Published: 2018-11-20
Trigger Detection
Membership Inference
Cryptographic Protocol