, , pp.2019-2031
, Arm TrustZone Technology, pp.2019-2031
, , 2019.
, PALISADE lattice cryptography library, 2019.
TensorFlow: Large-scale machine learning on heterogeneous systems, 2015. ,
Deep learning with differential privacy, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.308-318, 2016. ,
Over-the-air function computation in sensor networks, CoRR, 2016. ,
Privacy preserving synthetic data release using deep learning, Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp.510-526, 2018. ,
An economic analysis of privacy protection and statistical accuracy as social choices, American Economic Review, vol.109, issue.1, pp.171-202, 2019. ,
Inference under information constraints I: Lower bounds from chi-square contraction, 2018. ,
I have a DREAM!: DIfferentially PrivatE smart Metering, Proceedings of the 13th International Conference on Information Hiding, IH'11, pp.118-132, 2011. ,
cpSGD: Communication-efficient and differentially-private distributed SGD, Advances in Neural Information Processing Systems, pp.7564-7575, 2018. ,
A lattice-based computationally-efficient private information retrieval protocol, Cryptol. ePrint Arch., Report, p.446, 2007. ,
XPIR: Private information retrieval for everyone, Proceedings on Privacy Enhancing Technologies, vol.2016, pp.155-174, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01396142
, Under the hood of the Pixel 2: How AI is supercharging hardware, 2018.
, Federated learning for medical imaging, 2019.
QSGD: Communication-efficient SGD via gradient quantization and encoding, NIPS -Advances in Neural Information Processing Systems, pp.1709-1720, 2017. ,
Byzantine stochastic gradient descent, NIPS, 2018. ,
DJAM: Distributed Jacobi Asynchronous Method for Learning Personal Models, IEEE Signal Processing Letters, vol.25, issue.9, pp.1389-1392, 2018. ,
Ligero: Lightweight sublinear arguments without a trusted setup, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17, 2017. ,
Bounding user contributions: A biasvariance trade-off in differential privacy, International Conference on Machine Learning, pp.263-271, 2019. ,
PIR with compressed queries and amortized query processing, IEEE Symposium on Security and Privacy, pp.962-979, 2018. ,
HIPAA regulations-a new era of medical-record privacy, New England Journal of Medicine, vol.348, issue.15, pp.1486-1490, 2003. ,
Private Federated Learning (NeurIPS 2019 Expo Talk Abstract) ,
Designing for privacy (video and slide deck), Apple WWDC, 2019. ,
High-throughput semi-honest secure three-party computation with an honest majority, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.805-817, 2016. ,
Stochastic gradient push for distributed deep learning, ICML, 2019. ,
Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples, ICML, 2018. ,
Generative models for effective ML on private, decentralized datasets, 2019. ,
, The Clara Training Framework Authors. NVIDIA Clara, 2019.
Federated AI technology enabler, 2019. ,
, The Leaf Authors. Leaf, 2019.
, The PaddleFL Authors. PaddleFL, 2019.
, The PaddlePaddle Authors. PaddlePaddle, 2019.
, TensorFlow Federated, 2019.
BLENDER: Enabling local search with a hybrid differential privacy model, 26th USENIX Security Symposium (USENIX Security 17), pp.747-764, 2017. ,
Checking computations in polylogarithmic time, STOC, pp.21-31, 1991. ,
Differential privacy has disparate impact on model accuracy. CoRR, abs/1905.12101, 2019. ,
How to backdoor federated learning, 2018. ,
The privacy blanket of the shuffle model, Advances in Cryptology -CRYPTO 2019 -39th Annual International Cryptology Conference, pp.638-667, 2019. ,
Differentially private summation with multi-message shuffling, 2019. ,
, Adrià Gascón, and Kobbi Nissim. Improved summation from shuffling, 2019.
Secure evaluation of quantized neural networks, IACR Cryptology ePrint Archive, p.131, 2019. ,
Lower bounds for learning distributions under communication constraints via Fisher information, 2019. ,
Fairness and Machine Learning. fairmlbook.org, 2019. ,
A little is enough: Circumventing defenses for distributed learning, 2019. ,
Local, private, efficient protocols for succinct histograms, STOC, pp.127-135, 2015. ,
Practical locally private heavy hitters, Advances in Neural Information Processing Systems, pp.2288-2296, 2017. ,
A model of inductive bias learning, Journal of Artificial Intelligence Research, vol.12, pp.149-198, 2000. ,
The power of synergy in differential privacy: Combining a small curator with local randomizers, Workshop on Privacy Preserving Machine Learning (PriML) at NeurIPS, 2019. ,
Personalized and Private Peer-to-Peer Machine Learning, In AISTATS, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01665422
Neural optimizer search with reinforcement learning, Proceedings of the 34th International Conference on Machine Learning, vol.70, pp.459-468, 2017. ,
A theory of learning from different domains, Machine learning, vol.79, issue.1-2, pp.151-175, 2010. ,
Zerocash: Decentralized anonymous payments from bitcoin, IEEE Symposium on Security and Privacy, pp.459-474, 2014. ,
Scalable zero knowledge with no trusted setup, CRYPTO (3), vol.11694, pp.701-732, 2019. ,
Algorithms for hyper-parameter optimization, Advances in Neural Information Processing Systems, pp.2546-2554, 2011. ,
Learning adversarially fair and transferable representations, ICML, 2019. ,
Analyzing federated learning through an adversarial lens, Proceedings of the 36th International Conference on Machine Learning, pp.634-643, 2019. ,
Protection against reconstruction and its applications in private federated learning, 2018. ,
Poisoning attacks against support vector machines, Proceedings of the 29th International Coference on International Conference on Machine Learning, ICML'12, pp.1467-1474, 2012. ,
Evasion attacks against machine learning at test time, ECML-PKDD, pp.387-402 ,
, , 2013.
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS '12, 2012. ,
Staircase-PIR: Universally robust private information retrieval, IEEE Information Theory Workshop (ITW), pp.1-5, 2018. ,
Prochlo: Strong privacy for analytics in the crowd, Proceedings of the 26th Symposium on Operating Systems Principles, SOSP '17, pp.441-459, 2017. ,
Machine learning with adversaries: Byzantine tolerant gradient descent, Advances in Neural Information Processing Systems, 2017. ,
Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent, Advances in Neural Information Processing Systems, pp.118-128, 2017. ,
Deploying secure multi-party computation for financial data analysis -(short paper), Financial Cryptography, vol.7397, pp.57-64, 2012. ,
Secure multiparty computation goes live, Financial Cryptography, vol.5628, pp.325-343, 2009. ,
Practical secure aggregation for federated learning on user-held data, 2016. ,
Practical secure aggregation for privacy-preserving machine learning, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1175-1191, 2017. ,
Towards federated learning at scale: System design, 2019. ,
Federated learning with autotuned communication-efficient secure aggregation, 2019 53nd Asilomar Conference on Signals, Systems, and Computers, 2019. ,
Zero-knowledge proofs on secret-shared data via fully linear PCPs, CRYPTO, vol.11694, pp.67-97, 2019. ,
Fast homomorphic evaluation of deep discretized neural networks, CRYPTO (3), vol.10993, pp.483-512, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01665330
Randomized gossip algorithms, IEEE Transactions on Information Theory, vol.52, issue.6, pp.2508-2530, 2006. ,
Fully homomorphic encryption without modulus switching from classical gapsvp, CRYPTO, vol.7417, pp.868-886, 2012. ,
(leveled) fully homomorphic encryption without bootstrapping, ITCS, pp.309-325, 2012. ,
Communication lower bounds for statistical estimation problems via a distributed data processing inequality, Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, pp.1011-1020, 2016. ,
Decision-based adversarial attacks: Reliable attacks against black-box machine learning models, 2017. ,
Federated learning of predictive models from federated electronic health records, International journal of medical informatics, vol.112, pp.59-67, 2018. ,
Bulletproofs: Short proofs for confidential transactions and more, 2018 IEEE Symposium on Security and Privacy, pp.21-23, 2018. ,
Gender shades: Intersectional accuracy disparities in commercial gender classification, Conference on fairness, accountability and transparency, pp.77-91, 2018. ,
SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics, Dilip Many, and Xenofontas Dimitropoulos, pp.1-101101, 2010. ,
Expanding the reach of federated learning by reducing client resource requirements, 2018. ,
, Virginia Smith, and Ameet Talwalkar. LEAF: A benchmark for federated settings, 2018.
The structure of optimal private tests for simple hypotheses, 2019. ,
Towards evaluating the robustness of neural networks, 2017 IEEE Symposium on Security and Privacy (SP), pp.39-57, 2017. ,
The secret sharer: Measuring unintended neural network memorization & extracting secrets, 2018. ,
Privacy-preserving stream aggregation with fault tolerance, International Conference on Financial Cryptography and Data Security, pp.200-214, 2012. ,
Distributed deep learning networks among institutions for medical imaging, Journal of the American Medical Informatics Association, vol.25, issue.8, pp.945-954, 2018. ,
On the upload versus download cost for secure and private matrix multiplication. ArXiv, abs, 1906. ,
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, 1981. ,
, Taesung Lee, Ian Molloy, and Biplav Srivastava. Detecting backdoor attacks on deep neural networks by activation clustering, 2018.
DRACO: Byzantineresilient distributed training via redundant gradients, Proceedings of the 35th International Conference on Machine Learning, ICML, 2018. ,
Federated learning of out-ofvocabulary words, 2019. ,
ZOO: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models, Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp.15-26, 2017. ,
, Targeted backdoor attacks on deep learning systems using data poisoning, 2017.
Distributed Statistical Machine Learning in Adversarial Settings, Byzantine Gradient Descent. POMACS, vol.1, 2017. ,
On key recovery attacks against existing somewhat homomorphic encryption schemes, LATINCRYPT, vol.8895, pp.239-258, 2014. ,
SecureBoost: A lossless federated learning framework. CoRR, abs/1901.08755, 2019. ,
Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts, 2019 IEEE European Symposium on Security and Privacy (EuroS&P), pp.185-200, 2019. ,
Distributed differential privacy via shuffling, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.375-403, 2019. ,
Private information retrieval, J. ACM, vol.45, issue.6, pp.965-981, 1998. ,
SentiNet: Detecting physical attacks against deep learning systems, 2018. ,
Data matching: concepts and techniques for record linkage, entity resolution, and duplicate detection, 2012. ,
EMNIST: an extension of MNIST to handwritten letters, 2017. ,
Gossip dual averaging for decentralized optimization of pairwise functions, ICML, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-02107511
Marginal release under local differential privacy, Proceedings of the 2018 International Conference on Management of Data, pp.131-146, 2018. ,
Scale-invariant fully homomorphic encryption over the integers, Public Key Cryptography, vol.8383, pp.311-328, 2014. ,
Prio: Private, robust, and scalable computation of aggregate statistics, 14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17), pp.259-282, 2017. ,
Private information retrieval with sublinear online time, IACR Cryptology ePrint Archive, p.1075, 2019. ,
Domain adaptation and sample bias correction theory and algorithm for regression, Theoretical Computer Science, vol.519, pp.103-126, 2014. ,
, Intel SGX explained. IACR Cryptology ePrint Archive, issue.086, pp.1-118, 2016.
Sanctum: Minimal hardware extensions for strong software isolation, 25th {USENIX} Security Symposium ({USENIX} Security 16), pp.857-874, 2016. ,
Geppetto: Versatile verifiable computation, IEEE Symposium on Security and Privacy, pp.253-270, 2015. ,
Better mini-batch algorithms via accelerated gradient methods, Advances in Neural Information Processing Systems 24, 2011. ,
BinaryConnect: Training deep neural networks with binary weights during propagations, Advances in neural information processing systems, pp.3123-3131, 2015. ,
Deep learning-based classification of mesothelioma improves prediction of patient outcome, Nature medicine, pp.1-7, 2019. ,
Elements of information theory, 2012. ,
Casting out demons: Sanitizing training data for anomaly sensors, 2008 IEEE Symposium on Security and Privacy, pp.81-95, 2008. ,
Differential privacy for growing databases, Advances in Neural Information Processing Systems 31, NeurIPS '18, pp.8864-8873, 2018. ,
Differentially private changepoint detection, Advances in Neural Information Processing Systems 31, NeurIPS '18, pp.10825-10834, 2018. ,
Bringing differential privacy into the experimental economics lab: Theory and an application to a public-good game, 2019. ,
On the compatibility of privacy and fairness, Proceedings of Fairness in User Modeling, Adaptation and Personalization, FairUMAP, 2019. ,
On ? protocols ,
Data encoding for Byzantine-resilient distributed optimization, 2019. ,
The federated future is ready for shipping, 2019. ,
Large scale distributed deep networks, Proceedings of the International Conference on Neural Information Processing Systems, pp.1223-1231, 2012. ,
Optimal distributed online prediction using mini-batches, J. Mach. Learn. Res, vol.13, issue.1, 2012. ,
Sever: A robust meta-algorithm for stochastic optimization, Proceedings of the 36th International Conference on Machine Learning, vol.97, pp.9-15, 2019. ,
, Theoretical guarantees for model auditing with finite adversaries, 2019.
, Learning with privacy at scale, Differential Privacy Team, vol.1, 2017.
Collecting telemetry data privately, Advances in Neural Information Processing Systems, vol.30, 2017. ,
Detecting violations of differential privacy, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS '18, pp.475-489, 2018. ,
Tor: The second-generation onion router, 2004. ,
Lifting private information retrieval from two to any number of messages, 2018 IEEE International Symposium on Information Theory (ISIT), pp.1744-1748, 2018. ,
The sybil attack, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.251-260, 2002. ,
The power of the hybrid model for mean estimation, Workshop on Privacy Preserving Machine Learning at NeurIPS, 2018. ,
Local privacy and statistical minimax rates, Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium on, pp.429-438, 2013. ,
Slow and Stale Gradients Can Win the Race: Error-Runtime Trade-offs in, Distributed SGD. International Conference on Artificial Intelligence and Statistics (AISTATS), 2018. ,
Differential privacy: A survey of results, International Conference on Theory and Applications of Models of Computation, pp.1-19, 2008. ,
The algorithmic foundations of differential privacy, Foundations and Trends in Theoretical Computer Science, vol.9, issue.3-4, pp.211-407, 2014. ,
Our data, ourselves: Privacy via distributed noise generation, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.486-503, 2006. ,
Calibrating noise to sensitivity in private data analysis, IACR Theory of Cryptography Conference (TCC), vol.3876, pp.265-284, 2006. ,
Boosting and differential privacy, Proceedings of the IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS '10, pp.51-60, 2010. ,
Fairness through awareness, Proceedings of the 3rd innovations in theoretical computer science conference, pp.214-226, 2012. ,
Layers of bias: A unified approach for understanding problems with risk assessment, Criminal Justice and Behavior, vol.46, issue.2, pp.185-209, 2019. ,
Semi-cyclic stochastic gradient descent, Accepted to ICML 2019, 2019. ,
SMART: secure and minimal architecture for (establishing dynamic) root of trust, NDSS. The Internet Society, 2012. ,
GADMM: Fast and communication efficient framework for distributed machine learning, 2019. ,
Efficient multi-objective neural architecture search via Lamarckian evolution, 2018. ,
A rotation and a translation suffice: Fooling CNNs with simple transformations, 2017. ,
RAPPOR: Randomized aggregatable privacypreserving ordinal response, ACM CCS, 2014. ,
Amplification by shuffling: From local to central differential privacy via anonymity, SODA, pp.2468-2479, 2019. ,
Machine learning ledger orchestration for drug discovery, 2019. ,
, ?WT.mc_id=RSS-Feed& WT.rss_f=project&WT.rss_a=223634&WT.rss_ev=a. Retrieved, 2019.
BOHB: Robust and efficient hyperparameter optimization at scale, 2018. ,
Somewhat practical fully homomorphic encryption, IACR Cryptology ePrint Archive, p.144, 2012. ,
Local model poisoning attacks to Byzantine-robust federated learning, 2019. ,
Our vision, 2019. ,
Privacy amplification by iteration, IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS), pp.521-532, 2018. ,
Learning anonymized representations with adversarial neural networks. CoRR, abs/1802.09386, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01742447
Model-agnostic meta-learning for fast adaptation of deep networks, Proceedings of the 34th International Conference on Machine Learning, 2017. ,
A minimalist approach to remote attestation, DATE, pp.1-6, 2014. ,
Model inversion attacks that exploit confidence information and basic countermeasures, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.1322-1333, 2015. ,
Mitigating sybils in federated learning poisoning, 2018. ,
High-throughput secure three-party computation for malicious adversaries and an honest majority, EUROCRYPT, vol.10211, pp.225-255, 2017. ,
, Weight agnostic neural networks, 2019.
vqSGD: Vector quantized stochastic gradient descent, 2019. ,
Privacy-preserving distributed linear regression on high-dimensional data, PoPETs, vol.2017, issue.4, pp.345-364, 2017. ,
Non-interactive verifiable computing: Outsourcing computation to untrusted workers, CRYPTO, vol.6223, pp.465-482 ,
, , 2010.
Quadratic span programs and succinct NIZKs without PCPs, EUROCRYPT, vol.7881, pp.626-645 ,
, , 2013.
Compressible FHE with applications to PIR, TCC, vol.11892, pp.438-464, 2019. ,
Fully homomorphic encryption using ideal lattices, Stoc, vol.9, pp.169-178, 2009. ,
Differentially private federated learning: A client level perspective, 2017. ,
On the power of multiple anonymous messages, 2019. ,
Private aggregation from fewer anonymous messages, 2019. ,
Scalable and differentially private distributed aggregation in the shuffled model, 2019. ,
Universally utility-maximizing privacy mechanisms, Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC '09, pp.351-360, 2009. ,
CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy, Proceedings of the 33nd International Conference on Machine Learning, pp.201-210, 2016. ,
How to play any mental game, Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, STOC '87, pp.218-229 ,
The knowledge complexity of interactive proof systems, SIAM J. Comput, vol.18, issue.1, pp.186-208, 1989. ,
Delegating computation: interactive proofs for muggles, STOC, pp.113-122, 2008. ,
Explaining and harnessing adversarial examples, 3rd International Conference on Learning Representations, 2015. ,
Explaining and harnessing adversarial examples, 2015. ,
A comprehensive comparison of multiparty secure additions with differential privacy, IEEE Trans. Dependable Sec. Comput, vol.14, issue.5, pp.463-477, 2017. ,
BadNets: Identifying vulnerabilities in the machine learning model supply chain, 2017. ,
Distributed learning of deep neural network over multiple agents, Journal of Network and Computer Applications, vol.116, pp.1-8, 2018. ,
, Local SGD with periodic averaging: Tighter analysis and adaptive synchronization, 2019.
Differential privacy under fire, USENIX Security Symposium, 2011. ,
Secure computation on the web: Computing without simultaneous interaction, Annual Cryptology Conference, pp.132-150, 2011. ,
, Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding, 2015.
Geometric lower bounds for distributed parameter estimation under communication constraints, Proceedings of Machine Learning Research, vol.75, pp.1-26, 2018. ,
Federated learning for mobile keyboard prediction, 2018. ,
Equality of opportunity in supervised learning, Advances in Neural Information Processing Systems, 2016. ,
Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption, 2017. ,
Fairness without demographics in repeated loss minimization, International Conference on Machine Learning, pp.1934-1943, 2018. ,
Central server free federated learning over single-sided trust social networks, 2019. ,
COLA: Decentralized linear learning, NeurIPS 2018 -Advances in Neural Information Processing Systems 31, 2018. ,
Multicalibration: Calibration for the (computationally-identifiable) masses, International Conference on Machine Learning, pp.1944-1953, 2018. ,
Algorithms and theory for multiple-source adaptation, Advances in Neural Information Processing Systems, pp.8246-8256, 2018. ,
, , 2019.
The non-IID data quagmire of decentralized machine learning, 2019. ,
Measuring the effects of non-identical data distribution for federated visual classification, 2019. ,
Training neural networks using features replay, Advances in Neural Information Processing Systems, pp.6659-6668, 2018. ,
Architecture instruction set extensions programming reference, Intel Corporation, 2012. ,
Private intersection-sum protocol with applications to attributing aggregate ad conversions, Cryptology ePrint Archive, p.738, 2017. ,
On deploying secure computing commercially: Private intersection-sum protocols and their business applications, IACR Cryptology ePrint Archive, p.723, 2019. ,
Extending oblivious transfers efficiently, CRYPTO, vol.2729, pp.145-161, 2003. ,
Exploiting excessive invariance caused by norm-bounded adversarial robustness, 2019. ,
Decoupled neural interfaces using synthetic gradients, Proceedings of the 34th International Conference on Machine Learning, vol.70, pp.1627-1635, 2017. ,
Differentially private fair learning, 2018. ,
Communication-efficient on-device machine learning: Federated distillation and augmentation under non-IID private data. CoRR, abs/1811.11479, 2018. ,
On the capacity of secure distributed matrix multiplication, ArXiv, 2019. ,
Improving federated learning personalization via model agnostic meta learning, 2019. ,
Private information retrieval with side information: The single server case, 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp.1099-1106, 2017. ,
Extremal mechanisms for local differential privacy, Advances in Neural Information Processing Systems, vol.27, pp.2879-2887, 2014. ,
Discrete distribution estimation under local privacy, International Conference on Machine Learning, pp.2436-2444, 2016. ,
The composition theorem for differential privacy, IEEE Transactions on Information Theory, vol.63, issue.6, pp.4037-4049, 2017. ,
Fairness-aware learning through regularization approach, 2011 IEEE 11th International Conference on Data Mining Workshops, pp.643-650, 2011. ,
Testing robustness against unforeseen adversaries, 2019. ,
Incentive mechanism for reliable federated learning: A joint optimization approach to combining reputation and contract theory, IEEE Internet of Things Journal, 2019. ,
Incentive design for efficient federated learning in mobile networks: A contract theory approach, IEEE VTS Asia Pacific Wireless Communications Symposium, pp.1-5, 2019. ,
Linear convergence of gradient and proximal-gradient methods under the Polyak-?ojasiewicz condition, Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp.795-811, 2016. ,
, Stochastic controlled averaging for on-device federated learning, 2019.
Error feedback fixes SignSGD and other gradient compression schemes, ICML, 2019. ,
What can we learn privately?, SIAM J. Comput, vol.40, issue.3, pp.793-826, 2011. ,
,
, , 2015.
, Gradient descent with compressed iterates, 2019.
First analysis of local GD on heterogeneous data, 2019. ,
Better communication complexity for local SGD, 2019. ,
Adaptive gradient-based meta-learning methods, Advances in Neural Information Processing Systems, 2019. ,
Pufferfish: A framework for mathematical privacy definitions, ACM Transactions on Database Systems, vol.39, issue.1, pp.1-3, 2014. ,
Federated tensor factorization for computational phenotyping, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.887-895, 2017. ,
StatLog: comparison of classification algorithms on large real-world problems, Applied Artificial Intelligence an International Journal, vol.9, issue.3, pp.289-333, 1995. ,
TrustLite: a security architecture for tiny embedded devices, EuroSys, vol.10, 2014. ,
Understanding black-box predictions via influence functions, Proceedings of the 34th International Conference on Machine Learning, vol.70, pp.1885-1894, 2017. ,
Stronger data poisoning attacks break data sanitization defenses, 2018. ,
Automatic parameter selection by minimizing estimated error, Machine Learning Proceedings, pp.304-312, 1995. ,
Decentralized deep learning with arbitrary communication compression, 2019. ,
Decentralized Stochastic Optimization and Gossip Algorithms with Compressed Communication, ICML, 2019. ,
Randomized distributed mean estimation: Accuracy vs communication, Frontiers in Applied Mathematics and Statistics, vol.4, p.62, 2018. ,
Federated learning: Strategies for improving communication efficiency, 2016. ,
Fair decision making using privacy-protected data. CoRR, abs/1905.12744, 2019. ,
Adversarial machine learning at scale, 2016. ,
Communication Complexity, 1997. ,
Replication is not needed: Single database, computationally-private information retrieval, Proc. of the 38th Annu. IEEE Symp. on Foundations of Computer Science, pp.364-373, 1997. ,
Counterfactual fairness, Advances in Neural Information Processing Systems, pp.4066-4076, 2017. ,
, Proceedings on Privacy Enhancing Technologies, vol.2016, pp.115-134, 2016.
One shot learning of simple visual concepts, Proceedings of the Conference of the Cognitive Science Society (CogSci), 2017. ,
Peer-to-peer Federated Learning on Graphs, 2019. ,
Decentralized Bayesian learning over graphs, 1905. ,
The Byzantine generals problem, ACM Transactions on Programming Languages and Systems (TOPLAS), vol.4, issue.3, pp.382-401, 1982. ,
An optimal method for stochastic composite optimization, Mathematical Programming, vol.133, issue.1, pp.365-397, 2012. ,
Secure MPC for analytics as a web application, SecDev, pp.73-74, 2016. ,
Certified robustness to adversarial examples with differential privacy, 2019 IEEE Symposium on Security and Privacy, vol.2019, pp.656-672, 2019. ,
Federated learning for keyword spotting, 2018. ,
Differentially private meta-learning, 2019. ,
Federated optimization in heterogeneous networks, 2018. ,
Federated learning: Challenges, methods, and future directions, 2019. ,
Fair resource allocation in federated learning, 2019. ,
, On the convergence of fedavg on non-IID data, 2019.
Communication efficient decentralized training with multiple local updates, 2019. ,
Can Decentralized Algorithms Outperform Centralized Algorithms? A Case Study for Decentralized Parallel Stochastic Gradient Descent, NIPS, 2017. ,
Asynchronous Decentralized Parallel Stochastic Gradient Descent, ICML, 2018. ,
Learning generative adversarial representations (GAP) under fairness and censoring constraints, 2019. ,
Glimmers: Resolving the privacy/trust quagmire, Proceedings of the 16th Workshop on Hot Topics in Operating Systems, pp.94-99, 2017. ,
Fixed point quantization of deep convolutional networks, International Conference on Machine Learning, pp.2849-2858, 2016. ,
Don't use large mini-batches, use local SGD, 2018. ,
Deep gradient compression: Reducing the communication bandwidth for distributed training, 2017. ,
, DARTS: Differentiable architecture search, 2018.
Fine-pruning: Defending against backdooring attacks on deep neural networks, International Symposium on Research in Attacks, Intrusions, and Defenses, pp.273-294, 2018. ,
Minimax rates of estimating approximate differential privacy, 2019. ,
Secure federated transfer learning, 2018. ,
Trojaning attack on neural networks, 25th Annual Network and Distributed System Security Symposium, NDSS 2018, 2018. ,
Real-world image datasets for federated learning, 2019. ,
Neural architecture optimization, Advances in neural information processing systems, pp.7816-7827, 2018. ,
Privacy-preserving tensor factorization for collaborative health data analysis, ACM CIKM, vol.2, 2019. ,
Data poisoning against differentially-private learners: Attacks and defenses, International Joint Conference on Artificial Intelligence (IJCAI), 2019. ,
Learning adversarially fair and transferable representations, In ICML, 2018. ,
Towards deep learning models resistant to adversarial attacks, 2017. ,
, Domain adaptation: Learning bounds and algorithms, 2009.
Domain adaptation with multiple sources, Advances in neural information processing systems, pp.1041-1048, 2009. ,
Current clinical use of polygenic scores will risk exacerbating health disparities, BioRxiv, p.441261, 2019. ,
Federated learning: Collaborative machine learning without centralized training data, 2017. ,
A general approach to adding differential privacy to iterative training procedures, p.1812, 2018. ,
Communication-efficient learning of deep networks from decentralized data, Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, pp.1273-1282, 2016. ,
Learning differentially private recurrent language models, International Conference on Learning Representations (ICLR), 2018. ,
Mechanism design via differential privacy, FOCS, pp.94-103, 2007. ,
Using machine teaching to identify optimal training-set attacks on machine learners, Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015. ,
Exploiting unintended feature leakage in collaborative learning, 2018. ,
The hidden vulnerability of distributed learning in Byzantium, ICML, 2018. ,
Computationally sound proofs, SIAM J. Comput, vol.30, issue.4, pp.1253-1298, 2000. ,
On significance of the least significant bits for differential privacy, Proceedings of the 2012 ACM conference on Computer and communications security, pp.650-661, 2012. ,
Rényi differential privacy, 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp.263-275, 2017. ,
Omer Reingold, and Salil Vadhan. Computational differential privacy, Advances in Cryptology-CRYPTO, pp.126-142, 2009. ,
R\'enyi differential privacy of the sampled Gaussian mechanism, 2019. ,
Prediction-based decisions and fairness: A catalogue of choices, assumptions, and definitions, 2018. ,
Learning to label aerial images from noisy data, Proceedings of the 29th International conference on machine learning (ICML-12), pp.567-574, 2012. ,
SecureML: A system for scalable privacy-preserving machine learning, IEEE Symposium on Security and Privacy, pp.19-38, 2017. ,
Agnostic Federated Learning, ICML, 2019. ,
A unifying view on dataset shift in classification, Pattern Recogn, vol.45, issue.1, 2012. ,
, , 2019.
ON-OFF privacy with correlated requests, 2019 IEEE International Symposium on Information Theory (ISIT), 2019. ,
Learning with noisy labels, Advances in neural information processing systems, pp.1196-1204, 2013. ,
On first-order meta-learning algorithms, 2018. ,
Privacypreserving ridge regression on hundreds of millions of records, IEEE Symposium on Security and Privacy, pp.334-348, 2013. ,
, Secure federated submodel learning, 2019.
, Defense in depth: A practical strategy for achieving Information Assurance in today's highly networked environments, 2012.
Model compression by entropy penalized reparameterization, 2019. ,
Revisiting the computational practicality of private information retrieval, International Conference on Financial Cryptography and Data Security, pp.158-172, 2011. ,
A survey on transfer learning, IEEE Transactions on Knowledge and Data Engineering, vol.22, issue.10, pp.1345-1359, 2010. ,
Practical black-box attacks against machine learning, Proceedings of the 2017 ACM on Asia conference on computer and communications security, pp.506-519, 2017. ,
, , 2018.
Pinocchio: nearly practical verifiable computation, Commun. ACM, vol.59, issue.2, pp.103-112, 2016. ,
Communication trade-offs for synchronized distributed SGD with large step size, NeurIPS, 2019. ,
Private stateful information retrieval, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS '18, pp.1002-1019, 2018. ,
Fast learning from distributed datasets without entity matching, Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, pp.1909-1917, 2016. ,
, Hyperparameter optimization with approximate gradient, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01386410
Efficient neural architecture search via parameter sharing, International Conference on Machine Learning, pp.4092-4101, 2018. ,
Google's Sundar Pichai: Privacy Should Not Be a Luxury Good, New York Times, 2019. ,
AdaCliP: Adaptive clipping for private SGD, 2019. ,
Differentially-private "Draw and Discard" machine learning, 2018. ,
Robust aggregation for federated learning, 2019. ,
Dataset Shift in Machine Learning, p.9780262170055, 2009. ,
DETOX: A redundancy-based framework for faster and more robust gradient aggregation, 2019. ,
Federated learning for emoji prediction in a mobile keyboard, 2019. ,
Differentially private aggregation of distributed time-series with transformation and encryption, Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, SIGMOD '10, pp.735-746, 2010. ,
Optimization as a model for few-shot learning, Proceedings of the 5th International Conference on Learning Representations, 2017. ,
Large-scale evolution of image classifiers, Proceedings of the 34th International Conference on Machine Learning, vol.70, pp.2902-2911, 2017. ,
Regularized evolution for image classifier architecture search, Proceedings of the AAAI Conference on Artificial Intelligence, vol.33, pp.4780-4789, 2019. ,
Fedpaq: A communication-efficient federated learning method with periodic averaging and quantization, 2019. ,
Aryan Mokhtari, Hamed Hassani, and Ramtin Pedarsani. Robust and communication-efficient collaborative learning, 2019. ,
Turning HATE into LOVE: homomorphic ad hoc threshold encryption for scalable MPC, IACR Cryptology ePrint Archive, p.997, 2018. ,
HEAX: High-performance architecture for computation on homomorphically encrypted data in the cloud, 2019. ,
Dirty data, bad predictions: How civil rights violations impact police data, predictive policing systems, and justice, 2019. ,
Statistical aspects of neural networks. Networks and chaos-statistical and probabilistic aspects, vol.50, pp.40-123, 1993. ,
On data banks and privacy homomorphisms. Foundations of Secure Computation, pp.169-179, 1978. ,
Honeycrisp: large-scale differentially private aggregation without a trusted core, SOSP, pp.196-210, 2019. ,
A generic framework for privacy preserving deep learning, 2018. ,
Parallel random numbers: As easy as 1, 2, 3, Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, p.16, 2011. ,
Federated learning for ultra-reliable low-latency V2V communications. CoRR, abs/1805.09253, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01923670
A review of homomorphic encryption libraries for secure computation, 2018. ,
Robust and communicationefficient federated learning from non-IID data, 2019. ,
Efficient private record linkage of very large datasets, 59 th World Statistics Congress, 2013. ,
A novel error-tolerant anonymous linking code, German Record Linkage Center Working Paper Series, 2011. ,
Efficient identification and signatures for smart cards, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, EUROCRYPT '89, 1990. ,
, , 2019.
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems, Malware Detection, vol.27, pp.253-289, 2007. ,
Adversarial training for free, 2019. ,
ExpertMatcher: Automating ML model selection for clients using hidden representations, 2019. ,
Attacking the Madry defense model with l 1-based adversarial examples, 2017. ,
Learning with bad training data via iterative trimmed loss minimization, Proceedings of the 36th International Conference on Machine Learning, vol.97, pp.9-15, 2019. ,
Privacy-preserving aggregation of time-series data, Annual Network & Distributed System Security Symposium (NDSS), 2011. ,
Membership inference attacks against machine learning models, 2017 IEEE Symposium on Security and Privacy (SP), pp.3-18, 2017. ,
A comprehensive guide to Bayesian convolutional neural network with variational inference, 1901. ,
Lifelong machine learning systems: Beyond learning algorithms, AAAI Spring Symposium Series, 2013. ,
Detailed comparison of communication efficiency of split learning and federated learning, 2019. ,
On the computational practicality of private information retrieval, Proceedings of the Network and Distributed Systems Security Symposium, pp.2006-2012, 2007. ,
Federated Multi-Task Learning, NIPS, 2017. ,
Prototypical networks for few-shot learning, Advances in Neural Information Processing Systems, 2017. ,
Mostofa Patwary, Mr Prabhat, and Ryan Adams. Scalable Bayesian optimization using deep neural networks, International conference on machine learning, pp.2171-2180, 2015. ,
Privacy risks of securing machine learning models against adversarial examples, Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2019. ,
Efficient asynchronous secure multiparty distributed computation, International Conference on Cryptology in India, pp.117-129, 2000. ,
Privacy-Preserving Adversarial Representation Learning in ASR: Reality or Illusion, Annual Conference of the International Speech Communication Association (Interspeech), 2019. ,
Certified defenses for data poisoning attacks, Advances in neural information processing systems, pp.3517-3529, 2017. ,
Tight lower bounds for differentially private selection, FOCS, pp.552-563, 2017. ,
Local SGD converges fast and communicates little, International Conference on Learning Representations (ICLR), 2019. ,
The error-feedback framework: Better rates for SGD with delayed gradients and compressed communication, 2019. ,
Fault-Tolerant Multi-Agent Optimization: Optimal Iterative Distributed Algorithms, PODC, 2016. ,
A formal foundation for secure remote execution of enclaves, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.2435-2450, 2017. ,
, Can you really backdoor federated learning, 2019.
, Your chats stay private while Messages improves suggestions, 2019.
Distributed mean estimation with limited communication, Proceedings of the 34th International Conference on Machine Learning, vol.70, pp.3329-3337, 2017. ,
Intriguing properties of neural networks, 2013. ,
Measuring and testing dependence by correlation of distances. The annals of statistics, vol.35, pp.2769-2794, 2007. ,
D2: Decentralized training over decentralized data, ICML, 2018. ,
DeepSqueeze: Parallel stochastic gradient descent with double-pass error-compensated compression, 2019. ,
, Differentially private learning with adaptive clipping, 2019.
Slalom: Fast, verifiable and private execution of neural networks in trusted hardware, International Conference on Learning Representations, 2019. ,
Adversarial training and robustness for multiple perturbations, 2019. ,
Stealing machine learning models via prediction APIs, 25th USENIX Security Symposium, USENIX Security 16, pp.601-618, 2016. ,
Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge, 2017 IEEE European Symposium on Security and Privacy, pp.19-34, 2017. ,
Ensemble adversarial training: Attacks and defenses, 6th International Conference on Learning Representations, 2018. ,
Spectral signatures in backdoor attacks, Advances in Neural Information Processing Systems, pp.8000-8010, 2018. ,
Tight lower bounds for locally differentially private selection, 2018. ,
, The Google-Landmark v2 Authors, 2019.
Privacy-preserving SVM classification, Knowl. Inf. Syst, vol.14, issue.2, 2008. ,
Foreshadow: Extracting the keys to the intel {SGX} kingdom with transient out-of-order execution, 27th {USENIX} Security Symposium ({USENIX} Security 18), pp.991-1008, 2018. ,
Decentralized collaborative learning of personalized models over networks, AISTATS, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01533182
Split learning for health: Distributed deep learning without sharing raw patient data, 2018. ,
Supervised dimensionality reduction via distance correlation maximization, Electronic Journal of Statistics, vol.12, issue.1, pp.960-984, 2018. ,
Reducing leakage in distributed deep learning for sensitive health data, 2019. ,
PowerSGD: Practical low-rank gradient compression for distributed optimization, NeurIPS 2019 -Advances in Neural Information Processing Systems, vol.32, 2019. ,
Doubly-efficient zksnarks without trusted setup, 2018 IEEE Symposium on Security and Privacy, pp.21-23, 2018. ,
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks, 2019 IEEE Symposium on Security and Privacy, 2019. ,
Cooperative SGD: A unified framework for the design and analysis of communication-efficient SGD algorithms, 2018. ,
Adaptive Communication Strategies for Best Error-Runtime Trade-offs in Communication-Efficient Distributed SGD, Proceedings of the SysML Conference, 2019. ,
MATCHA: Speeding Up Decentralized SGD via Matching Decomposition Sampling. preprint, 2019. ,
SlowMo: Improving communicationefficient distributed SGD with slow momentum, 2019. ,
Federated evaluation of on-device personalization, 2019. ,
, , 2018.
Subsampled R\'enyi differential privacy and analytical moments accountant, 2018. ,
Randomized response: A survey technique for eliminating evasive answer bias, Journal of the American Statistical Association, vol.60, issue.309, pp.63-69, 1965. ,
WeBank and Swiss re signed cooperation MOU, 2019. ,
Wasserstein adversarial examples via projected sinkhorn iterations. ICML, 2019. ,
Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, vol.151, pp.1-32, 2014. ,
A geometric approach to information-theoretic private information retrieval, 20th Annual IEEE Conference on Computational Complexity (CCC'05), pp.275-284, 2005. ,
Graph oracle models, lower bounds, and gaps for parallel stochastic optimization, Advances in Neural Information Processing Systems (NIPS), 2018. ,
Multiscale quantization for fast similarity search, Advances in Neural Information Processing Systems, pp.5745-5755, 2017. ,
Laurens van der Maaten, Alan Yuille, and Kaiming He. Feature denoising for improving adversarial robustness, 2019. ,
, Zeno++: robust asynchronous SGD with arbitrary number of Byzantine workers, 2019.
Practical distributed learning: Secure machine learning with communication-efficient local updates, European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2019. ,
Zeno: Distributed stochastic gradient descent with suspicionbased fault-tolerance, International Conference on Machine Learning, pp.6893-6901, 2019. ,
, SNAS: stochastic neural architecture search, 2018.
Libra: Succinct zero-knowledge proofs with optimal prover computation, CRYPTO, vol.11694, pp.733-764, 2019. ,
Federated machine learning: Concept and applications. CoRR, abs/1902.04885, 2019. ,
Applied federated learning: Improving Google keyboard query suggestions, 2018. ,
Protocols for secure computations, Symposium on Foundations of Computer Science, 1982. ,
How to generate and exchange secrets (extended abstract), FOCS, pp.162-167, 1986. ,
Preserving ON-OFF privacy for past and future requests, 2019 IEEE Information Theory Workshop (ITW), 2019. ,
Optimal schemes for discrete distribution estimation under locally differential privacy, IEEE Transactions on Information Theory, 2018. ,
Privacy risk in machine learning: Analyzing the connection to overfitting, IEEE 31st Computer Security Foundations Symposium (CSF), pp.268-282, 2018. ,
Byzantine-robust distributed learning: Towards optimal statistical rates, ICML, 2019. ,
, Distributed learning over unreliable networks, 2018.
Parallel restarted SGD for non-convex optimization with faster convergence and less communication, 2018. ,
On the linear speedup analysis of communication efficient momentum SGD for distributed non-convex optimization, 2019. ,
Fairness constraints: Mechanisms for fair classification, Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, 2017. ,
Fully Decentralized Joint Learning of Personalized Models and Collaboration Graphs, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02166433
Deep learning with elastic averaging SGD, Advances in Neural Information Processing Systems, pp.685-693, 2015. ,
A survey on multi-task learning, 2017. ,
Information-theoretic lower bounds for distributed statistical estimation with communication constraints, Advances in Neural Information Processing Systems, pp.2328-2336, 2013. ,
Decentralized online learning: Take benefits from others' data without sharing your own to track global trend, 2019. ,
To prune, or not to prune: exploring the efficacy of pruning for model compression, 2017. ,
Federated heavy hitters discovery with differential privacy, 2019. ,
Machine teaching: An inverse problem to machine learning and an approach toward optimal education, Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015. picture archiving ,