PAC to the Future: Zero-Knowledge Proofs of PAC Private Systems Authors: Guilhem Repetto, Nojan Sheybani, Gabrielle De Micheli, Farinaz Koushanfar | Published: 2026-02-12 AlgorithmPrivacy AssuranceComputational Consistency 2026.02.12 2026.02.14 Literature Database
Private Transformer Inference in MLaaS: A Survey Authors: Yang Li, Xinyu Zhou, Yitong Wang, Liangxin Qian, Jun Zhao | Published: 2025-05-15 Encryption TechnologyMachine LearningComputational Consistency 2025.05.15 2025.05.28 Literature Database
DarKnight: A Data Privacy Scheme for Training and Inference of Deep Neural Networks Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2020-06-01 | Updated: 2020-10-15 Data Protection MethodPrivacy AssessmentComputational Consistency 2020.06.01 2025.05.28 Literature Database
Certified Defense to Image Transformations via Randomized Smoothing Authors: Marc Fischer, Maximilian Baader, Martin Vechev | Published: 2020-02-27 | Updated: 2021-08-25 Robustness EvaluationComputational ConsistencyDefense Method 2020.02.27 2025.05.28 Literature Database
Adversarially Robust Learning Could Leverage Computational Hardness Authors: Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody | Published: 2019-05-28 | Updated: 2019-12-19 Adversarial ExampleAdversarial LearningComputational Consistency 2019.05.28 2025.05.28 Literature Database
Private Machine Learning in TensorFlow using Secure Computation Authors: Morten Dahl, Jason Mancuso, Yann Dupis, Ben Decoste, Morgan Giraud, Ian Livingstone, Justin Patriquin, Gavin Uhma | Published: 2018-10-18 | Updated: 2018-10-23 Data Protection MethodPrivacy Risk ManagementComputational Consistency 2018.10.18 2025.05.28 Literature Database