暗号化技術

Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy

Authors: Chandra Thapa, Seyit Camtepe | Published: 2020-08-24
スマートヘルスケア
プライバシー保護手法
暗号化技術

DRAB-LOCUS: An Area-Efficient AES Architecture for Hardware Accelerator Co-Location on FPGAs

Authors: Jacob T. Grycel, Robert J. Walls | Published: 2019-11-11
ハードウェアアクセラレータ
リソース最適化
暗号化技術

nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data

Authors: Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski | Published: 2019-08-12 | Updated: 2019-08-29
CKKS最適化
性能評価
暗号化技術

Helen: Maliciously Secure Coopetitive Learning for Linear Models

Authors: Wenting Zheng, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica | Published: 2019-07-16 | Updated: 2019-09-03
MPCアルゴリズム
ポイズニング
暗号化技術

Private Hierarchical Clustering and Efficient Approximation

Authors: Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos | Published: 2019-04-09 | Updated: 2021-10-01
プライバシー保護技術
暗号化技術
階層クラスタリング

Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference

Authors: Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, Li Fei-Fei | Published: 2018-11-25
トリガーの検知
モデル性能評価
暗号化技術

The Taboo Trap: Behavioural Detection of Adversarial Samples

Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2018-11-18 | Updated: 2019-11-21
バックドアモデルの検知
暗号化技術
防御手法

Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach

Authors: Minhao Cheng, Thong Le, Pin-Yu Chen, Jinfeng Yi, Huan Zhang, Cho-Jui Hsieh | Published: 2018-07-12
モデル評価
敵対的攻撃
暗号化技術

Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables

Authors: Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli | Published: 2018-03-12
マルウェア検出手法
敵対的攻撃検出
暗号化技術

Gazelle: A Low Latency Framework for Secure Neural Network Inference

Authors: Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan | Published: 2018-01-16
安全な算術計算
暗号化技術
透かし技術