SHE-LoRA: Selective Homomorphic Encryption for Federated Tuning with Heterogeneous LoRA Authors: Jianmin Liu, Li Yan, Borui Li, Lei Yu, Chao Shen | Published: 2025-05-27 Client-Side DefensePrivacy ClassificationEncryption Method 2025.05.27 2025.05.29 Literature Database
Improved Privacy-Preserving PCA Using Optimized Homomorphic Matrix Multiplication Authors: Xirong Ma | Published: 2023-05-27 | Updated: 2023-08-17 Privacy Protection MethodConvergence PropertyEncryption Method 2023.05.27 2025.05.28 Literature Database
Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks Authors: Ignjat Pejic, Rui Wang, Kaitai Liang | Published: 2022-07-01 Future ResearchEncryption MethodChallenges of Generative Models 2022.07.01 2025.05.28 Literature Database
Enabling Homomorphically Encrypted Inference for Large DNN Models Authors: Guillermo Lloret-Talavera, Marc Jorda, Harald Servat, Fabian Boemer, Chetan Chauhan, Shigeki Tomishima, Nilesh N. Shah, Antonio J. Peña | Published: 2021-03-30 | Updated: 2021-04-29 Measurement of MemorizationEncryption MethodOptimization Methods 2021.03.30 2025.05.28 Literature Database
InstaHide: Instance-hiding Schemes for Private Distributed Learning Authors: Yangsibo Huang, Zhao Song, Kai Li, Sanjeev Arora | Published: 2020-10-06 | Updated: 2021-02-24 Attack TypeEncryption MethodEncryption Technology 2020.10.06 2025.05.28 Literature Database
Efficient Private Machine Learning by Differentiable Random Transformations Authors: Fei Zheng | Published: 2020-08-18 Membership InferenceEncryption MethodMachine Learning 2020.08.18 2025.05.28 Literature Database
AutoPrivacy: Automated Layer-wise Parameter Selection for Secure Neural Network Inference Authors: Qian Lou, Song Bian, Lei Jiang | Published: 2020-06-07 | Updated: 2020-10-15 Performance EvaluationPrivacy AssessmentEncryption Method 2020.06.07 2025.05.28 Literature Database
Attacks on Image Encryption Schemes for Privacy-Preserving Deep Neural Networks Authors: Alex Habeen Chang, Benjamin M. Case | Published: 2020-04-28 | Updated: 2020-04-29 AlgorithmAttack Pattern ExtractionEncryption Method 2020.04.28 2025.05.28 Literature Database
Collaborative Homomorphic Computation on Data Encrypted under Multiple Keys Authors: Asma Aloufi, Peizhao Hu | Published: 2019-11-11 Secure Communication ChannelPrivacy-Preserving AlgorithmEncryption Method 2019.11.11 2025.05.28 Literature Database
SEALion: a Framework for Neural Network Inference on Encrypted Data Authors: Tim van Elsloo, Giorgio Patrini, Hamish Ivey-Law | Published: 2019-04-29 FrameworkEncryption MethodDeep Learning Technology 2019.04.29 2025.05.28 Literature Database