Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Private analytics via streaming, sketching, and silently verifiable proofs
We present Whisper, a system for privacy-preserving collection of aggregate statistics. Like
prior systems, a Whisper deployment consists of a small set of non-colluding servers; these …
prior systems, a Whisper deployment consists of a small set of non-colluding servers; these …
Verifiable distributed aggregation functions
The modern Internet is built on systems that incentivize collection of information about users.
In order to minimize privacy loss, it is desirable to prevent these systems from collecting …
In order to minimize privacy loss, it is desirable to prevent these systems from collecting …
{POPSTAR}: Lightweight Threshold Reporting with Reduced Leakage
This paper proposes POPSTAR, a new lightweight protocol for the private computation of
heavy hitters, also known as a private threshold reporting system. In such a protocol, the …
heavy hitters, also known as a private threshold reporting system. In such a protocol, the …
Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy
Federated learning (FL) has rapidly become a compelling paradigm that enables multiple
clients to jointly train a model by sharing only gradient updates for aggregation, without …
clients to jointly train a model by sharing only gradient updates for aggregation, without …
Curl: Private LLMs through wavelet-encoded look-up tables
Recent advancements in transformers have revolutionized machine learning, forming the
core of Large language models (LLMs). However, integrating these systems into everyday …
core of Large language models (LLMs). However, integrating these systems into everyday …
Delegated private matching for compute
Private matching for compute (PMC) establishes a match between two datasets owned by
mutually distrusted parties (C and P) and allows the parties to input more data for the …
mutually distrusted parties (C and P) and allows the parties to input more data for the …
Non-interactive distributed point functions
Abstract Distributed Point Functions (DPFs) are a useful cryptographic primitive enabling a
dealer to distribute short keys to two parties, such that the keys encode additive secret …
dealer to distribute short keys to two parties, such that the keys encode additive secret …
Mastic: Private weighted heavy-hitters and attribute-based metrics
Insight into user experience and behavior is critical to the success of large software systems
and web services. Gaining such insights, while preserving user privacy, is a significant …
and web services. Gaining such insights, while preserving user privacy, is a significant …
Mostree: malicious secure private decision tree evaluation with sublinear communication
A private decision tree evaluation (PDTE) protocol allows a feature vector owner (FO) to
classify its data using a tree model from a model owner (MO) and only reveals an inference …
classify its data using a tree model from a model owner (MO) and only reveals an inference …
Juliet: A configurable processor for computing on encrypted data
Fully homomorphic encryption (FHE) has become progressively more viable in the years
since its original inception in 2009. At the same time, leveraging state-of-the-art schemes in …
since its original inception in 2009. At the same time, leveraging state-of-the-art schemes in …