Encryption Technology

Private Hierarchical Clustering and Efficient Approximation

Authors: Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos | Published: 2019-04-09 | Updated: 2021-10-01
Privacy Enhancing Technology
Encryption Technology
Hierarchical Clustering

Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference

Authors: Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, Li Fei-Fei | Published: 2018-11-25
Trigger Detection
Model Performance Evaluation
Encryption Technology

The Taboo Trap: Behavioural Detection of Adversarial Samples

Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2018-11-18 | Updated: 2019-11-21
Backdoor Detection
Encryption Technology
Defense Method

Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach

Authors: Minhao Cheng, Thong Le, Pin-Yu Chen, Jinfeng Yi, Huan Zhang, Cho-Jui Hsieh | Published: 2018-07-12
Model Evaluation
Adversarial attack
Encryption Technology

Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables

Authors: Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli | Published: 2018-03-12
Malware Detection Method
Adversarial Attack Detection
Encryption Technology

Gazelle: A Low Latency Framework for Secure Neural Network Inference

Authors: Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan | Published: 2018-01-16
Secure Arithmetic Computation
Encryption Technology
Watermarking Technology

CryptoDL: Deep Neural Networks over Encrypted Data

Authors: Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi | Published: 2017-11-14
Differential Privacy
Encryption Technology
Approximate Calculation

Morpheo: Traceable Machine Learning on Hidden data

Authors: Mathieu Galtier, Camille Marini | Published: 2017-04-17
Privacy Enhancing Technology
Platform Architecture
Encryption Technology