暂无分享,去创建一个
Li Fei-Fei | Albert Haque | Serena Yeung | Edward Chou | Daniel Levy | Josh Beal | Li Fei-Fei | S. Yeung | Albert Haque | Edward Chou | Josh Beal | Daniel Levy | Serena Yeung
[1] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[2] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[3] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[4] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[5] Kurt Hornik,et al. Approximation capabilities of multilayer feedforward networks , 1991, Neural Networks.
[6] A. Uncini Piazza,et al. Artificial neural networks with adaptive polynomial activation function , 1992 .
[7] Yoshua Bengio,et al. Convolutional networks for images, speech, and time series , 1998 .
[8] A Hoover,et al. Locating blood vessels in retinal images by piece-wise threshold probing of a matched filter response , 1998, AMIA.
[9] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[10] Yoshua Bengio,et al. Série Scientifique Scientific Series Incorporating Second-order Functional Knowledge for Better Option Pricing Incorporating Second-order Functional Knowledge for Better Option Pricing , 2022 .
[11] Khashayar Khorasani,et al. Constructive feedforward neural networks using Hermite polynomial activation functions , 2005, IEEE Transactions on Neural Networks.
[12] Arnaud Tisserand,et al. Computing machine-efficient polynomial approximations , 2006, TOMS.
[13] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[14] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[15] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[16] Li Fei-Fei,et al. ImageNet: A large-scale hierarchical image database , 2009, CVPR.
[17] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[18] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[19] Vitaly Shmatikov,et al. Privacy-Preserving Classifier Learning , 2009, Financial Cryptography.
[20] Yoshua Bengio,et al. Deep Sparse Rectifier Neural Networks , 2011, AISTATS.
[21] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[22] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[23] Anand D. Sarwate,et al. Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..
[24] S. Fienberg,et al. Secure multiple linear regression based on homomorphic encryption , 2011 .
[25] Yoshua Bengio,et al. Deep Learning of Representations for Unsupervised and Transfer Learning , 2011, ICML Unsupervised and Transfer Learning.
[26] Roi Livni,et al. On the Computational Efficiency of Training Neural Networks , 2014, NIPS.
[27] Pengtao Xie,et al. Crypto-Nets: Neural Networks over Encrypted Data , 2014, ArXiv.
[28] Yoshua Bengio,et al. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling , 2014, ArXiv.
[29] David Harvey,et al. Faster arithmetic for number-theoretic transforms , 2012, J. Symb. Comput..
[30] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[31] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[32] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[33] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[34] Ronald M. Summers,et al. Deep Learning in Medical Imaging: Overview and Future Promise of an Exciting New Technique , 2016 .
[35] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[36] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[37] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[38] Subhashini Venugopalan,et al. Development and Validation of a Deep Learning Algorithm for Detection of Diabetic Retinopathy in Retinal Fundus Photographs. , 2016, JAMA.
[39] Song Han,et al. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding , 2015, ICLR.
[40] Yiran Chen,et al. Learning Structured Sparsity in Deep Neural Networks , 2016, NIPS.
[41] Sedat Akleylek,et al. An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation , 2016, AFRICACRYPT.
[42] Quynh N. Nguyen,et al. Globally Optimal Training of Generalized Polynomial Neural Networks with Nonlinear Spectral Methods , 2016, NIPS.
[43] Julien Eynard,et al. A Full RNS Variant of FV Like Somewhat Homomorphic Encryption Schemes , 2016, SAC.
[44] Yurong Chen,et al. Dynamic Network Surgery for Efficient DNNs , 2016, NIPS.
[45] Nima Tajbakhsh,et al. Convolutional Neural Networks for Medical Image Analysis: Full Training or Fine Tuning? , 2016, IEEE Transactions on Medical Imaging.
[46] Fan Zhang,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[47] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[48] Jianxin Wu,et al. ThiNet: A Filter Level Pruning Method for Deep Neural Network Compression , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[49] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[50] Lin Xu,et al. Incremental Network Quantization: Towards Lossless CNNs with Low-Precision Weights , 2017, ICLR.
[51] Quoc V. Le,et al. Swish: a Self-Gated Activation Function , 2017, 1710.05941.
[52] Hao Chen,et al. Simple Encrypted Arithmetic Library v2.3.0 , 2017 .
[53] Hassan Takabi,et al. CryptoDL: Deep Neural Networks over Encrypted Data , 2017, ArXiv.
[54] Pascal Paillier,et al. Fast Homomorphic Evaluation of Deep Discretized Neural Networks , 2018, IACR Cryptol. ePrint Arch..
[55] Zahra Ghodsi,et al. SafetyNets: Verifiable Execution of Deep Neural Networks on an Untrusted Cloud , 2017, NIPS.
[56] Somesh Jha,et al. Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption , 2018, IACR Cryptol. ePrint Arch..
[57] Arnaud Tisserand,et al. A High-Speed Accelerator for Homomorphic Encryption using the Karatsuba Algorithm , 2017, ACM Trans. Embed. Comput. Syst..
[58] Constance Morel,et al. Privacy-Preserving Classification on Deep Neural Network , 2017, IACR Cryptol. ePrint Arch..
[59] Martín Abadi,et al. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data , 2016, ICLR.
[60] Jung Hee Cheon,et al. Privacy-Preserving Computations of Predictive Medical Models with Minimax Approximation and Non-Adjacent Form , 2017, Financial Cryptography Workshops.
[61] Replication study: Development and validation of deep learning algorithm for detection of diabetic retinopathy in retinal fundus photographs , 2018, ArXiv.
[62] Úlfar Erlingsson,et al. Scalable Private Learning with PATE , 2018, ICLR.
[63] Sungroh Yoon,et al. Security and Privacy Issues in Deep Learning , 2018, ArXiv.
[64] Ting Wang,et al. Differentially Private Releasing via Deep Generative Model , 2018, ArXiv.
[65] Ian J. Goodfellow,et al. A ug 2 01 7 On the Protection of Private Information in Machine Learning Systems : Two Recent Approaches ( Invited Paper ) , 2018 .
[66] Farinaz Koushanfar,et al. DeepSecure: Scalable Provably-Secure Deep Learning , 2017, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[67] Varun Kanade,et al. TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service , 2018, ICML.
[68] R. Hardwarsing. Stochastic Gradient Descent with Differentially Private Updates , 2018 .
[69] Amit Sahai,et al. Homomorphic Encryption Standard , 2019, IACR Cryptol. ePrint Arch..
[70] Behrad Toghi,et al. MNIST Dataset Classification Utilizing k-NN Classifier with Modified Sliding Window Metric , 2018, ArXiv.