Related references
Note: Only part of the references are listed.Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection
Lingchen Zhao et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption
Asma Aloufi et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach
Zhibo Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
Robust Lane Detection From Continuous Driving Scenes Using Deep Neural Networks
Qin Zou et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
Privacy-Preserving Collaborative Deep Learning With Unreliable Participants
Lingchen Zhao et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Deep Learning-Based Gait Recognition Using Smartphones in the Wild
Qin Zou et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training
Qian Wang et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2018)
Manual for Using Homomorphic Encryption for Bioinformatics
Nathan Dowlin et al.
PROCEEDINGS OF THE IEEE (2017)
Oblivious Neural Network Predictions via MiniONN Transformations
Jian Liu et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
Daniel Demmler et al.
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) (2015)
Machine Learning Classification over Encrypted Data
Raphael Bost et al.
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) (2015)
Fully homomorphic SIMD operations
N. P. Smart et al.
DESIGNS CODES AND CRYPTOGRAPHY (2014)