Encryption Technology

TenSEAL: A Library for Encrypted Tensor Operations Using Homomorphic Encryption

Authors: Ayoub Benaissa, Bilal Retiat, Bogdan Cebere, Alaa Eddine Belfedhal | Published: 2021-04-07 | Updated: 2021-04-28
Privacy Protection
Encryption Technology
Machine Learning Technology

CaPC Learning: Confidential and Private Collaborative Learning

Authors: Christopher A. Choquette-Choo, Natalie Dullerud, Adam Dziedzic, Yunxiang Zhang, Somesh Jha, Nicolas Papernot, Xiao Wang | Published: 2021-02-09 | Updated: 2021-03-19
Active Learning
Data Protection Method
Encryption Technology

InstaHide: Instance-hiding Schemes for Private Distributed Learning

Authors: Yangsibo Huang, Zhao Song, Kai Li, Sanjeev Arora | Published: 2020-10-06 | Updated: 2021-02-24
Attack Type
Encryption Method
Encryption Technology

Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy

Authors: Chandra Thapa, Seyit Camtepe | Published: 2020-08-24
Smart Healthcare
Privacy Protection Method
Encryption Technology

DRAB-LOCUS: An Area-Efficient AES Architecture for Hardware Accelerator Co-Location on FPGAs

Authors: Jacob T. Grycel, Robert J. Walls | Published: 2019-11-11
Hardware Accelerator
Resource optimization
Encryption Technology

nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data

Authors: Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski | Published: 2019-08-12 | Updated: 2019-08-29
CKKS Optimization
Performance Evaluation
Encryption Technology

Helen: Maliciously Secure Coopetitive Learning for Linear Models

Authors: Wenting Zheng, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica | Published: 2019-07-16 | Updated: 2019-09-03
MPC Algorithm
Poisoning
Encryption Technology

Private Hierarchical Clustering and Efficient Approximation

Authors: Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos | Published: 2019-04-09 | Updated: 2021-10-01
Privacy Enhancing Technology
Encryption Technology
Hierarchical Clustering

Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference

Authors: Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, Li Fei-Fei | Published: 2018-11-25
Trigger Detection
Model Performance Evaluation
Encryption Technology

The Taboo Trap: Behavioural Detection of Adversarial Samples

Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2018-11-18 | Updated: 2019-11-21
Backdoor Detection
Encryption Technology
Defense Method