Vectorized Secure Evaluation of Decision Forests Authors: Raghav Malik, Vidush Singhal, Benjamin Gottfried, Milind Kulkarni | Published: 2021-04-19 Privacy ProtectionModel DesignEncryption Technology 2021.04.19 2025.05.28 Literature Database
Secure Human Action Recognition by Encrypted Neural Network Inference Authors: Miran Kim, Xiaoqian Jiang, Kristin Lauter, Elkhan Ismayilzada, Shayan Shams | Published: 2021-04-19 | Updated: 2022-08-09 Data Protection MethodData Management SystemEncryption Technology 2021.04.19 2025.05.28 Literature Database
Privacy-preserving Federated Learning based on Multi-key Homomorphic Encryption Authors: Jing Ma, Si-Ahmed Naas, Stephan Sigg, Xixiang Lyu | Published: 2021-04-14 Privacy ProtectionDistributed LearningEncryption Technology 2021.04.14 2025.05.28 Literature Database
TenSEAL: A Library for Encrypted Tensor Operations Using Homomorphic Encryption Authors: Ayoub Benaissa, Bilal Retiat, Bogdan Cebere, Alaa Eddine Belfedhal | Published: 2021-04-07 | Updated: 2021-04-28 Privacy ProtectionEncryption TechnologyMachine Learning Technology 2021.04.07 2025.05.28 Literature Database
CaPC Learning: Confidential and Private Collaborative Learning Authors: Christopher A. Choquette-Choo, Natalie Dullerud, Adam Dziedzic, Yunxiang Zhang, Somesh Jha, Nicolas Papernot, Xiao Wang | Published: 2021-02-09 | Updated: 2021-03-19 Active LearningData Protection MethodEncryption Technology 2021.02.09 2025.05.28 Literature Database
InstaHide: Instance-hiding Schemes for Private Distributed Learning Authors: Yangsibo Huang, Zhao Song, Kai Li, Sanjeev Arora | Published: 2020-10-06 | Updated: 2021-02-24 Attack TypeEncryption MethodEncryption Technology 2020.10.06 2025.05.28 Literature Database
Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy Authors: Chandra Thapa, Seyit Camtepe | Published: 2020-08-24 Smart HealthcarePrivacy Protection MethodEncryption Technology 2020.08.24 2025.05.28 Literature Database
DRAB-LOCUS: An Area-Efficient AES Architecture for Hardware Accelerator Co-Location on FPGAs Authors: Jacob T. Grycel, Robert J. Walls | Published: 2019-11-11 Hardware AcceleratorResource optimizationEncryption Technology 2019.11.11 2025.05.28 Literature Database
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data Authors: Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski | Published: 2019-08-12 | Updated: 2019-08-29 CKKS OptimizationPerformance EvaluationEncryption Technology 2019.08.12 2025.05.28 Literature Database
Helen: Maliciously Secure Coopetitive Learning for Linear Models Authors: Wenting Zheng, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica | Published: 2019-07-16 | Updated: 2019-09-03 MPC AlgorithmPoisoningEncryption Technology 2019.07.16 2025.05.28 Literature Database