Privacy-preserving machine learning: Methods, challenges and directions

R Xu, N Baracaldo, J Joshi - arxiv preprint arxiv:2108.04417, 2021 - arxiv.org
Machine learning (ML) is increasingly being adopted in a wide variety of application
domains. Usually, a well-performing ML model relies on a large volume of training data and …

Trustworthy graph neural networks: Aspects, methods and trends

H Zhang, B Wu, X Yuan, S Pan, H Tong… - arxiv preprint arxiv …, 2022 - arxiv.org
Graph neural networks (GNNs) have emerged as a series of competent graph learning
methods for diverse real-world scenarios, ranging from daily applications like …

Sirnn: A math library for secure rnn inference

D Rathee, M Rathee, RKK Goli, D Gupta… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Complex machine learning (ML) inference algorithms like recurrent neural networks (RNNs)
use standard functions from math libraries like exponentiation, sigmoid, tanh, and reciprocal …

SoK: cryptographic neural-network computation

LKL Ng, SSM Chow - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
We studied 53 privacy-preserving neural-network papers in 2016-2022 based on
cryptography (without trusted processors or differential privacy), 16 of which only use …

Secure quantized training for deep learning

M Keller, K Sun - International Conference on Machine …, 2022 - proceedings.mlr.press
We implement training of neural networks in secure multi-party computation (MPC) using
quantization commonly used in said setting. We are the first to present an MNIST classifier …

A secure federated learning framework using homomorphic encryption and verifiable computing

A Madi, O Stan, A Mayoue… - … Privacy, and Security …, 2021 - ieeexplore.ieee.org
In this paper, we present the first Federated Learning (FL) framework which is secure
against both confidentiality and integrity threats from the aggregation server, in the case …

Bibliometrics of machine learning research using homomorphic encryption

Z Chen, G Hu, M Zheng, X Song, L Chen - Mathematics, 2021 - mdpi.com
Since the first fully homomorphic encryption scheme was published in 2009, many papers
have been published on fully homomorphic encryption and its applications. Machine …

Lightweight privacy-preserving predictive maintenance in 6G enabled IIoT

H Li, S Li, G Min - Journal of Industrial Information Integration, 2024 - Elsevier
While the 5G is being rolled out in different industrial sectors, the 6G is expected to
implement data-driven ubiquitous machine learning for industrial information integration …

Gradient inversion attacks: Impact factors analyses and privacy enhancement

Z Ye, W Luo, Q Zhou, Z Zhu, Y Shi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Gradient inversion attacks (GIAs) have posed significant challenges to the emerging
paradigm of distributed learning, which aims to reconstruct the private training data of clients …

On the Gini-impurity preservation for privacy random forests

XR **e, MJ Yuan, X Bai, W Gao… - Advances in Neural …, 2024 - proceedings.neurips.cc
Random forests have been one successful ensemble algorithms in machine learning.
Various techniques have been utilized to preserve the privacy of random forests from …