Distributed and Secure ML with Self-tallying Multi-party Aggregation

Authors: Yunhui Long, Tanmay Gangwani, Haris Mughees, Carl Gunter | Published: 2018-11-26

Generalised Differential Privacy for Text Document Processing

Authors: Natasha Fernandes, Mark Dras, Annabelle McIver | Published: 2018-11-26 | Updated: 2019-02-05

Compressible and Learnable Encryption for Untrusted Cloud Environments

Authors: Hitoshi Kiya | Published: 2018-11-26

Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference

Authors: Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, Li Fei-Fei | Published: 2018-11-25

A Fully Private Pipeline for Deep Learning on Electronic Health Records

Authors: Edward Chou, Thao Nguyen, Josh Beal, Albert Haque, Li Fei-Fei | Published: 2018-11-25

Biscotti: A Ledger for Private and Secure Peer-to-Peer Machine Learning

Authors: Muhammad Shayan, Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh | Published: 2018-11-24 | Updated: 2019-12-12

Dancing in the Dark: Private Multi-Party Machine Learning in an Untrusted Setting

Authors: Clement Fung, Jamie Koerner, Stewart Grant, Ivan Beschastnikh | Published: 2018-11-23 | Updated: 2019-02-24

FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions

Authors: Shaohua Li, Kaiping Xue, Chenkai Ding, Xindi Gao, David S L Wei, Tao Wan, Feng Wu | Published: 2018-11-20

Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition

Authors: Jenn-Bing Ong, Wee-Keong Ng, C. -C. Jay Kuo | Published: 2018-11-20 | Updated: 2018-12-11

Lightweight Lipschitz Margin Training for Certified Defense against Adversarial Examples

Authors: Hajime Ono, Tsubasa Takahashi, Kazuya Kakizaki | Published: 2018-11-20