Computational Consistency

Private Transformer Inference in MLaaS: A Survey

Authors: Yang Li, Xinyu Zhou, Yitong Wang, Liangxin Qian, Jun Zhao | Published: 2025-05-15
Encryption Technology
Machine Learning
Computational Consistency

DarKnight: A Data Privacy Scheme for Training and Inference of Deep Neural Networks

Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2020-06-01 | Updated: 2020-10-15
Data Protection Method
Privacy Assessment
Computational Consistency

Certified Defense to Image Transformations via Randomized Smoothing

Authors: Marc Fischer, Maximilian Baader, Martin Vechev | Published: 2020-02-27 | Updated: 2021-08-25
Robustness Evaluation
Computational Consistency
Defense Method

Adversarially Robust Learning Could Leverage Computational Hardness

Authors: Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody | Published: 2019-05-28 | Updated: 2019-12-19
Adversarial Example
Adversarial Learning
Computational Consistency

Private Machine Learning in TensorFlow using Secure Computation

Authors: Morten Dahl, Jason Mancuso, Yann Dupis, Ben Decoste, Morgan Giraud, Ian Livingstone, Justin Patriquin, Gavin Uhma | Published: 2018-10-18 | Updated: 2018-10-23
Data Protection Method
Privacy Risk Management
Computational Consistency