Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy-preserving machine learning using functional encryption: Opportunities and challenges
With the advent of functional encryption (FE), new possibilities for the computation of
encrypted data have arisen. FE enables data owners to grant third-party access to perform …
encrypted data have arisen. FE enables data owners to grant third-party access to perform …
Privacy-preserving deep learning based on multiparty secure computation: A survey
Deep learning (DL) has demonstrated superior success in various of applications, such as
image classification, speech recognition, and anomalous detection. The unprecedented …
image classification, speech recognition, and anomalous detection. The unprecedented …
Survey and open problems in privacy-preserving knowledge graph: merging, query, representation, completion, and applications
Abstract Knowledge Graph (KG) has attracted more and more companies' attention for its
ability to connect different types of data in meaningful ways and support rich data services …
ability to connect different types of data in meaningful ways and support rich data services …
Privacy-preserving cloud-edge collaborative learning without trusted third-party coordinator
X Yu, D Tang, W Zhao - Journal of Cloud Computing, 2023 - Springer
Cloud-edge collaborative learning has received considerable attention recently, which is an
emerging distributed machine learning (ML) architecture for improving the performance of …
emerging distributed machine learning (ML) architecture for improving the performance of …
Towards faster functional encryption for privacy-preserving machine learning
Machine learning has become ubiquitous technology and is being used in many aspects of
our daily lives. However, as machine learning works with a huge amount of data, many …
our daily lives. However, as machine learning works with a huge amount of data, many …
Leaking secrets in homomorphic encryption with side-channel attacks
Homomorphic encryption (HE) allows computing encrypted data in the ciphertext domain
without knowing the encryption key. It is possible, however, to break fully homomorphic …
without knowing the encryption key. It is possible, however, to break fully homomorphic …
Reveal: Single-trace side-channel leakage of the seal homomorphic encryption library
This paper demonstrates the first side-channel attack on homomorphic encryption (HE),
which allows computing on encrypted data. We reveal a power-based side-channel leakage …
which allows computing on encrypted data. We reveal a power-based side-channel leakage …
I can't see it but I can Fine-tune it: On Encrypted Fine-tuning of Transformers using Fully Homomorphic Encryption
In today's machine learning landscape, fine-tuning pretrained transformer models has
emerged as an essential technique, particularly in scenarios where access to task-aligned …
emerged as an essential technique, particularly in scenarios where access to task-aligned …
Crypto makes AI evolve
Adopting cryptography has given rise to a significant? evolution in AI. This chapter studies
the path and stages of this evolution. We start with reviewing existing relevant surveys …
the path and stages of this evolution. We start with reviewing existing relevant surveys …
L-secnet: Towards secure and lightweight deep neural network inference
The advances in machine learning technology has promoted its great potential for deep
neural network (DNN) inference powered applications of Internet of Things (IoT), such as …
neural network (DNN) inference powered applications of Internet of Things (IoT), such as …