Trustworthy graph neural networks: Aspects, methods, and trends

H Zhang, B Wu, X Yuan, S Pan, H Tong… - Proceedings of the …, 2024 - ieeexplore.ieee.org
Graph neural networks (GNNs) have emerged as a series of competent graph learning
methods for diverse real-world scenarios, ranging from daily applications such as …

Pika: Secure computation using function secret sharing over rings

S Wagh - Proceedings on Privacy Enhancing Technologies, 2022 - petsymposium.org
Machine learning algorithms crucially depend on non-linear mathematical functions such as
division (for normalization), exponentiation (for softmax and sigmoid), tanh (as an activation …

Communication-efficient privacy-preserving neural network inference via arithmetic secret sharing

R Bi, J **ong, C Luo, J Ning, X Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Well-trained neural network models are deployed on edge servers to provide valuable
inference services for clients. To protect data privacy, a promising way is to exploit various …

ABNN2 secure two-party arbitrary-bitwidth quantized neural network predictions

L Shen, Y Dong, B Fang, J Shi, X Wang… - Proceedings of the 59th …, 2022 - dl.acm.org
Data privacy and security issues are preventing a lot of potential on-cloud machine learning
as services from happening. In the recent past, secure multi-party computation (MPC) has …

MPClan: Protocol suite for privacy-conscious computations

N Koti, S Patil, A Patra, A Suresh - Journal of Cryptology, 2023 - Springer
The growing volumes of data being collected and its analysis to provide better services are
creating worries about digital privacy. To address privacy concerns and give practical …

A novel privacy-preserving graph convolutional network via secure matrix multiplication

HF Zhang, F Zhang, H Wang, C Ma, PC Zhu - Information Sciences, 2024 - Elsevier
Graph convolutional network (GCN) is one of the most representative methods in the realm
of graph neural networks (GNNs). In the convolution process, GCN combines the structural …

SPEFL: efficient security and privacy-enhanced federated learning against poisoning attacks

L Shen, Z Ke, J Shi, X Zhang, Y Sun… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Federated learning (FL) is a distributed machine learning paradigm in the Internet of Things
(IoT), which allows multiple devices to collaboratively train models without leaking local …

Manto: A practical and secure inference service of convolutional neural networks for iot

K Cheng, J Fu, Y Shen, H Gao, N **… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
As convolutional neural networks (CNNs) exhibit remarkable performance in various
inference tasks, it is increasingly important to enable Internet of Things (IoT) devices to …

Entrada to Secure Graph Convolutional Networks

N Koti, VB Kukkala, A Patra, BR Gopal - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Graph convolutional networks (GCNs) are gaining popularity due to their powerful modelling
capabilities. However, guaranteeing privacy is an issue when evaluating on inputs that …

A secure and fair double auction framework for cloud virtual machines

K Cheng, W Tong, L Zheng, J Fu, X Mu, Y Shen - IEEE Access, 2021 - ieeexplore.ieee.org
Double auction is one of the most promising solutions to allocate virtual machine (VM)
resources in two-sided cloud markets, which can increase the utilization rate of VM …