Privacy-preserving machine learning: Threats and solutions, IEEE Security & Privacy, vol.17, issue.2, pp.49-58, 2019. ,
Efficient multiparty protocols using circuit randomization, Annual International Cryptology Conference, pp.420-432, 1991. ,
Optimizing semi-honest secure multiparty computation for the internet, Proceedings of the Conference on Computer and Communications Security, pp.578-590, 2016. ,
nGraph-HE2: A high-throughput framework for neural network inference on encrypted data, Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp.45-56, 2019. ,
nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data, Proceedings of the ACM International Conference on Computing Frontiers, pp.3-13, 2019. ,
Sharemind: A framework for fast privacypreserving computations, European Symposium on Research in Computer Security, pp.192-206, 2008. ,
, Towards federated learning at scale: System design, 2019.
Practical secure aggregation for privacy-preserving machine learning, Proceedings of the Conference on Computer and Communications Security, pp.1175-1191, 2017. ,
Function secret sharing, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.337-367 ,
, , 2015.
Function secret sharing: Improvements and extensions, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.1292-1303, 2016. ,
Secure computation with preprocessing via function secret sharing, Theory of Cryptography Conference, pp.341-371, 2019. ,
High performance convolutional neural networks for document processing, International Workshop on Frontiers in Handwriting Recognition, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00112631
Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds, international Conference on the Theory and Application of Cryptology and Information Security, pp.3-33, 2016. ,
URL : https://hal.archives-ouvertes.fr/cea-01832762
Private Image Analysis with MPC. Accessed 2019-11-01, 2017. ,
Multiparty computation from somewhat homomorphic encryption, Annual Cryptology Conference, pp.643-662 ,
, , 2012.
Aby-a framework for efficient mixed-protocol secure two-party computation, NDSS, 2015. ,
A survey of secure multiparty computation protocols for privacy preserving genetic tests, International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), pp.173-182, 2016. ,
Model inversion attacks that exploit confidence information and basic countermeasures, Proceedings of the Conference on Computer and Communications Security, pp.1322-1333, 2015. ,
Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy, International Conference on Machine Learning, pp.201-210, 2016. ,
Foundations of Cryptography, vol.2, 2009. ,
, , 2019.
Deep residual learning for image recognition, Proceedings of the Conference on Computer Vision and Pattern Recognition, pp.770-778, 2016. ,
Accuracy and stability of numerical algorithms, vol.80, 2002. ,
Deep models under the gan: information leakage from collaborative deep learning, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.603-618, 2017. ,
Chiron: Privacy-preserving machine learning as a service, 2018. ,
{GAZELLE}: A low latency framework for secure neural network inference, USENIX Security Symposium, vol.18, pp.1651-1669, 2018. ,
An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system, Future Generation Computer Systems, vol.86, pp.297-307, 2018. ,
Overdrive: making spdz great again, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.158-189, 2018. ,
Federated learning: Strategies for improving communication efficiency, 2016. ,
, The CIFAR-10 dataset, vol.55, 2014.
Imagenet classification with deep convolutional neural networks, Advances in Neural Information Processing Systems, pp.1097-1105, 2012. ,
Gradient-based learning applied to document recognition, Proceedings of the IEEE, vol.86, issue.11, pp.2278-2324, 1998. ,
MNIST handwritten digit database, vol.2, 2010. ,
Oblivious neural network predictions via minionn transformations, Proceedings of the Conference on Computer and Communications Security, pp.619-631, 2017. ,
Aby3: A mixed protocol framework for machine learning, Proceedings of the Conference on Computer and Communications Security, pp.35-52, 2018. ,
Secureml: A system for scalable privacy-preserving machine learning, Symposium on Security and Privacy (SP), pp.19-38, 2017. ,
An improved newton iteration for the generalized inverse of a matrix, with applications, SIAM Journal on Scientific and Statistical Computing, vol.12, issue.5, pp.1109-1130, 1991. ,
Information technology-based tracing strategy in response to COVID-19 in South Korea-privacy controversies, JAMA, 2020. ,
Privacy-preserving contact tracing of covid-19 patients, Cryptology ePrint, p.2020 ,
Chameleon: A hybrid secure computation framework for machine learning applications, Proceedings of the Asia Conference on Computer and Communications Security, pp.707-721, 2018. ,
Deepsecure: Scalable provably-secure deep learning, Proceedings of the 55th Annual Design Automation Conference, pp.1-6, 2018. ,
Imagenet large scale visual recognition challenge, International Journal of Computer Vision, vol.115, issue.3, pp.211-252, 2015. ,
A generic framework for privacy preserving deep learning, 2018. ,
, , 2018.
Privacy-preserving deep learning, Proceedings of the Conference on Computer and Communications Security, pp.1310-1321, 2015. ,
Very deep convolutional networks for large-scale image recognition, 2014. ,
Securenn: Efficient and private neural network training, IACR Cryptology ePrint Archive, p.442, 2018. ,
Falcon: Honest-majority maliciously secure framework for private deep learning, 2020. ,
Tiny imagenet challenge, 2017. ,
How to generate and exchange secrets, Annual Symposium on Foundations of Computer Science, pp.162-167, 1986. ,
The cut-and-choose game and its application to cryptographic protocols, USENIX Security Symposium Security 16, pp.1085-1100, 2016. ,