Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning Authors: Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu | Published: 2022-10-05 | Updated: 2024-04-19 DNN IP Protection MethodPrivacy Protection MethodCommunication Efficiency 2022.10.05 2025.05.28 Literature Database
An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks Authors: Zhi Qin Tan, Hao Shan Wong, Chee Seng Chan | Published: 2022-10-03 | Updated: 2022-10-04 DNN IP Protection MethodPerformance Evaluation MetricsIntellectual Property Protection 2022.10.03 2025.05.28 Literature Database
DeltaBound Attack: Efficient decision-based attack in low queries regime Authors: Lorenzo Rossi | Published: 2022-10-01 DNN IP Protection MethodModel Extraction AttackModel Design 2022.10.01 2025.05.28 Literature Database
A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks Authors: Kevin Hector, Mathieu Dumont, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2022-09-28 | Updated: 2022-09-30 DNN IP Protection MethodModel DesignDeep Learning Method 2022.09.28 2025.05.28 Literature Database
Audit and Improve Robustness of Private Neural Networks on Encrypted Data Authors: Jiaqi Xue, Lei Xu, Lin Chen, Weidong Shi, Kaidi Xu, Qian Lou | Published: 2022-09-20 DNN IP Protection MethodPrivacy Technique 2022.09.20 2025.05.28 Literature Database
Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis Authors: Sanjay Kariyappa, Chuan Guo, Kiwan Maeng, Wenjie Xiong, G. Edward Suh, Moinuddin K Qureshi, Hsien-Hsin S. Lee | Published: 2022-09-12 DNN IP Protection MethodPrivacy AnalysisModel Design 2022.09.12 2025.05.28 Literature Database
Preserving Privacy in Federated Learning with Ensemble Cross-Domain Knowledge Distillation Authors: Xuan Gong, Abhishek Sharma, Srikrishna Karanam, Ziyan Wu, Terrence Chen, David Doermann, Arun Innanje | Published: 2022-09-10 DNN IP Protection MethodPrivacy AnalysisPoisoning 2022.09.10 2025.05.28 Literature Database
Bridging the Gap: Differentially Private Equivariant Deep Learning for Medical Image Analysis Authors: Florian A. Hölzl, Daniel Rueckert, Georgios Kaissis | Published: 2022-09-09 | Updated: 2023-06-20 DNN IP Protection MethodModel DesignMedical Monitoring System 2022.09.09 2025.05.28 Literature Database
A Framework for Evaluating Privacy-Utility Trade-off in Vertical Federated Learning Authors: Yan Kang, Jiahuan Luo, Yuanqin He, Xiaojin Zhang, Lixin Fan, Qiang Yang | Published: 2022-09-08 | Updated: 2024-08-04 DNN IP Protection MethodPrivacy AnalysisModel Design 2022.09.08 2025.05.28 Literature Database
Joint Linear and Nonlinear Computation across Functions for Efficient Privacy-Preserving Neural Network Inference Authors: Qiao Zhang, Tao Xiang, Chunsheng Xin, Biwen Chen, Hongyi Wu | Published: 2022-09-04 DNN IP Protection MethodPrivacy AnalysisModel Design 2022.09.04 2025.05.28 Literature Database