CryptoTL: Private, efficient and secure transfer learning
暂无分享,去创建一个
Stefanie N. Lindstaedt | C. Rechberger | A. Trügler | Roman Walch | Samuel Sousa | Lukas Helminger | Christian Rechberger
[1] J. Passerat-Palmbach,et al. Split HE: Fast Secure Inference Combining Split Learning and Homomorphic Encryption , 2022, ArXiv.
[2] Byron C. Wallace,et al. Does BERT Pretrained on Clinical Notes Reveal Sensitive Data? , 2021, NAACL.
[3] Anwar Hithnawi,et al. SoK: Fully Homomorphic Encryption Compilers , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[4] Hui Xiong,et al. A Comprehensive Survey on Transfer Learning , 2019, Proceedings of the IEEE.
[5] Qiang Yang,et al. PrivNet: Safeguarding Private Attributes in Transfer Learning for Recommendation , 2020, FINDINGS.
[6] Jeeyun Baik,et al. Data Privacy Against Innovation or Against Discrimination?: The Case of the California Consumer Privacy Act (CCPA) , 2020, Telematics Informatics.
[7] Tianjian Chen,et al. A Secure Federated Transfer Learning Framework , 2020, IEEE Intelligent Systems.
[8] Jack W. Stokes,et al. Privacy-Preserving Phishing Web Page Classification Via Fully Homomorphic Encryption , 2020, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[9] Abdelouahid Derhab,et al. A review of privacy-preserving techniques for deep learning , 2020, Neurocomputing.
[10] Congzheng Song,et al. Information Leakage in Embedding Models , 2020, CCS.
[11] Wei Dai,et al. EVA: an encrypted vector arithmetic language and compiler for efficient homomorphic computation , 2019, PLDI.
[12] Aseem Rastogi,et al. CrypTFlow: Secure TensorFlow Inference , 2019, 2020 IEEE Symposium on Security and Privacy (SP).
[13] Khin Mi Mi Aung,et al. PrivFT: Private and Fast Text Classification With Homomorphic Encryption , 2019, IEEE Access.
[14] Shai Halevi,et al. Design and implementation of HElib: a homomorphic encryption library , 2020, IACR Cryptol. ePrint Arch..
[15] Raluca Ada Popa,et al. D ELPHI : A Cryptographic Inference Service for Neural Networks , 2019 .
[16] Ruby B. Lee,et al. Model inversion attacks against collaborative inference , 2019, ACSAC.
[17] Iryna Gurevych,et al. Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks , 2019, EMNLP.
[18] Sameer Wagh,et al. SecureNN: 3-Party Secure Computation for Neural Network Training , 2019, Proc. Priv. Enhancing Technol..
[19] Hao Chen,et al. CHET: an optimizing compiler for fully-homomorphic neural-network inferencing , 2019, PLDI.
[20] Sharath Pankanti,et al. Towards Deep Neural Network Training on Encrypted Data , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[21] Marcel Keller,et al. New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[22] Nicolas Gama,et al. TFHE: Fast Fully Homomorphic Encryption Over the Torus , 2019, Journal of Cryptology.
[23] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[24] Li Fei-Fei,et al. Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference , 2018, ArXiv.
[25] Peter Rindal,et al. ABY3: A Mixed Protocol Framework for Machine Learning , 2018, IACR Cryptol. ePrint Arch..
[26] Shai Halevi,et al. Faster Homomorphic Linear Transformations in HElib , 2018, IACR Cryptol. ePrint Arch..
[27] Chao Yang,et al. A Survey on Deep Transfer Learning , 2018, ICANN.
[28] Anantha Chandrakasan,et al. Gazelle: A Low Latency Framework for Secure Neural Network Inference , 2018, IACR Cryptol. ePrint Arch..
[29] Thomas Steinke,et al. Differential Privacy: A Primer for a Non-Technical Audience , 2018 .
[30] Răzvan Viorescu. 2018 REFORM OF EU DATA PROTECTION RULES , 2017 .
[31] Jung Hee Cheon,et al. Homomorphic Encryption for Arithmetic of Approximate Numbers , 2017, ASIACRYPT.
[32] Yao Lu,et al. Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..
[33] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[34] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[35] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[36] Tiago A. Almeida,et al. TubeSpam: Comment Spam Filtering on YouTube , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).
[37] Shai Halevi,et al. Bootstrapping for HElib , 2015, EUROCRYPT.
[38] Shai Halevi,et al. Algorithms in HElib , 2014, CRYPTO.
[39] Ming Zhou,et al. Adaptive Recursive Neural Network for Target-dependent Twitter Sentiment Classification , 2014, ACL.
[40] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[41] Zvika Brakerski,et al. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.
[42] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[43] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[44] Christopher Potts,et al. Learning Word Vectors for Sentiment Analysis , 2011, ACL.
[45] Qiang Yang,et al. A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.
[46] Koby Crammer,et al. A theory of learning from different domains , 2010, Machine Learning.
[47] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[48] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[49] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[50] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[51] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[52] Donald Beaver,et al. Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.
[53] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .