-
2
-
-
85075670920
-
TensorFlow: A system for Large-Scale machine learning
-
USENIX Association, GA
-
Martín Abadi et al. 2016. TensorFlow: A System for Large-Scale Machine Learning. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, GA, 265-283. https://www.usenix.org/conference/osdi16/technical-sessions/presentation/abadi
-
(2016)
12th USENIX Symposium On Operating Systems Design and Implementation (OSDI 16)
, pp. 265-283
-
-
Abadi, M.1
-
3
-
-
53549120899
-
A neural network approach for credit risk evaluation
-
2008
-
Eliana Angelini, Giacomo di Tollo, and Andrea Roli. 2008. A neural network approach for credit risk evaluation. The quarterly review of economics and finance 48, 4 (2008), 733-755.
-
(2008)
The Quarterly Review of Economics and Finance
, vol.48
, Issue.4
, pp. 733-755
-
-
Angelini, E.1
Tollo, D.I.G.2
Roli, A.3
-
6
-
-
70350399649
-
Secure evaluation of private linear branching programs with medical applications
-
Springer, Saint-Malo, France
-
Mauro Barni et al. 2009. Secure Evaluation of Private Linear Branching Programs with Medical Applications. In Computer Security-ESORICS 2009, 14th European Symposium on Research in Computer Security. Springer, Saint-Malo, France, 424-439. http://dx.doi.org/10.1007/978-3-642-04444-1-26
-
(2009)
Computer Security-ESORICS 2009, 14th European Symposium On Research in Computer Security
, pp. 424-439
-
-
Barni, M.1
-
7
-
-
33750908650
-
A Privacy-preserving protocol for Neuralnetwork-based computation
-
ACM, New York, NY, USA
-
M. Barni, C. Orlandi, and A. Piva. 2006. A Privacy-preserving Protocol for Neuralnetwork-based Computation. In Proceedings of the 8th Workshop on Multimedia and Security (MM&Sec '06). ACM, New York, NY, USA, 146-151. https://doi.org/10.1145/1161366.1161393
-
(2006)
Proceedings of the 8th Workshop On Multimedia and Security (MM&Sec '06)
, pp. 146-151
-
-
Barni, M.1
Orlandi, C.2
Piva, A.3
-
8
-
-
84933507780
-
Efficient multiparty protocols using circuit randomization
-
Santa Barbara, California, USA, August 11-15, 1991, Proceedings (Lecture Notes in Computer Science) Springer
-
Donald Beaver. 1991. Efficient Multiparty Protocols Using Circuit Randomization. In Advances in Cryptology-CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings (Lecture Notes in Computer Science), Vol. 576. Springer, 420-432. https://doi.org/10.1007/3-540-46766-1-34
-
(1991)
Advances in Cryptology-CRYPTO '91, 11th Annual International Cryptology Conference
, vol.576
, pp. 420-432
-
-
Beaver, D.1
-
9
-
-
84856673205
-
Theano: A CPU and GPU math compiler in Python
-
James Bergstra et al. 2010. Theano: A CPU and GPU math compiler in Python. In Proc. 9th Python in Science Conf. 1-7.
-
(2010)
Proc. 9th Python in Science Conf
, pp. 1-7
-
-
Bergstra, J.1
-
11
-
-
84862196355
-
A Universal toolkit for cryptographically secure Privacy-preserving Data mining
-
Springer-Verlag, Berlin, Heidelberg
-
Dan Bogdanov, Roman Jagomägis, and Sven Laur. 2012. A Universal Toolkit for Cryptographically Secure Privacy-preserving Data Mining. In Proceedings of the 2012 Pacific Asia Conference on Intelligence and Security Informatics (PAISI'12). Springer-Verlag, Berlin, Heidelberg, 112-126. https://doi.org/10.1007/978-3-642-30428-6-9
-
(2012)
Proceedings of the 2012 Pacific Asia Conference On Intelligence and Security Informatics (PAISI'12)
, pp. 112-126
-
-
Bogdanov, D.1
Jagomägis, R.2
Laur, S.3
-
12
-
-
57049188348
-
-
Springer Berlin Heidelberg, Berlin, Heidelberg
-
Dan Bogdanov, Sven Laur, and Jan Willemson. 2008. Sharemind: A Framework for Fast Privacy-Preserving Computations. Springer Berlin Heidelberg, Berlin, Heidelberg, 192-206. https://doi.org/10.1007/978-3-540-88313-5-13
-
(2008)
Sharemind: A Framework for Fast Privacy-Preserving Computations
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
13
-
-
84893357415
-
-
Springer Berlin Heidelberg, Berlin, Heidelberg
-
JoppeW. Bos, Kristin Lauter, Jake Loftus, and Michael Naehrig. 2013. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme. Springer Berlin Heidelberg, Berlin, Heidelberg, 45-64. https://doi.org/10.1007/978-3-642-45239-0-4
-
(2013)
Improved Security for A Ring-Based Fully Homomorphic Encryption Scheme
, pp. 45-64
-
-
Bos, J.W.1
Lauter, K.2
Loftus, J.3
Naehrig, M.4
-
14
-
-
85098887199
-
Machine learning classification over encrypted data
-
San Diego, California, USA, February 8-11 2015
-
Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser. 2015. Machine Learning Classification over Encrypted Data. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8-11, 2015. http://www.internetsociety.org/doc/machine-learning-classification-over-encrypted-data
-
(2015)
22nd Annual Network and Distributed System Security Symposium, NDSS 2015
-
-
Bost, R.1
Ada Popa, R.2
Tu, S.3
Goldwasser, S.4
-
15
-
-
71549138933
-
Privacy-preserving remote diagnostics
-
Alexandria, Virginia, USA, October 28-31, 2007
-
Justin Brickell, Donald E. Porter, Vitaly Shmatikov, and Emmett Witchel. 2007. Privacy-preserving remote diagnostics. In Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007. 498-507. http://doi.acm.org/10.1145/1315245.1315307
-
(2007)
Proceedings of the 2007 ACM Conference On Computer and Communications Security, CCS 2007
, pp. 498-507
-
-
Brickell, J.1
Porter, D.E.2
Shmatikov, V.3
Witchel, E.4
-
16
-
-
85040608700
-
-
Cryptology ePrint Archive, Report 2017/035
-
Hervé Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, and Emmanuel Prouff. 2017. Privacy-Preserving Classification on Deep Neural Network. Cryptology ePrint Archive, Report 2017/035. (2017). http://eprint.iacr. org/2017/035.
-
(2017)
Privacy-Preserving Classification On Deep Neural Network
, vol.2017
-
-
Chabanne, H.1
De Wargny, A.2
Milgram, J.3
Morel, C.4
Prouff, E.5
-
20
-
-
84055222005
-
Context-Dependent Pre-Trained deep neural networks for Large-Vocabulary speech recognition
-
Jan 2012
-
G. E. Dahl, D. Yu, L. Deng, and A. Acero. 2012. Context-Dependent Pre-Trained Deep Neural Networks for Large-Vocabulary Speech Recognition. IEEE Transactions on Audio, Speech, and Language Processing 20, 1 (Jan 2012), 30-42. https://doi.org/10.1109/TASL.2011.2134090
-
(2012)
IEEE Transactions On Audio Speech, and Language Processing
, vol.20
, Issue.1
, pp. 30-42
-
-
Dahl, G.E.1
Yu, D.2
Deng, L.3
Acero, A.4
-
21
-
-
85092033531
-
ABY-A Framework for efficient Mixed-Protocol secure Two-Party computation
-
San Diego, California, USA, February 8-11 2015
-
Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8-11, 2015.
-
(2015)
22nd Annual Network and Distributed System Security Symposium, NDSS 2015
-
-
Demmler, D.1
Schneider, T.2
Zohner, M.3
-
23
-
-
84976467897
-
Manual for using homomorphic encryption for bioinformatics
-
Nathan Dowlin, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2015. Manual for using homomorphic encryption for bioinformatics. Microsoft Research (2015).
-
(2015)
Microsoft Research
, vol.2015
-
-
Dowlin, N.1
Gilad-Bachrach, R.2
Laine, K.3
Lauter, K.4
Naehrig, M.5
Wernsing, J.6
-
24
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Springer
-
Taher ElGamal. 1985. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In CRYPTO (LNCS), Vol. 196. Springer, 10-18. https://doi.org/10.1007/3-540-39568-7-2
-
(1985)
CRYPTO (LNCS)
, vol.196
, pp. 10-18
-
-
ElGamal, T.1
-
26
-
-
85055873696
-
Privacy in Pharmacogenetics: An End-to-End case study of personalized warfarin dosing
-
USENIX Association
-
Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart. 2014. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, 17-32. https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/fredrikson-matthew
-
(2014)
23rd USENIX Security Symposium (USENIX Security 14)
, pp. 17-32
-
-
Fredrikson, M.1
Lantz, E.2
Jha, S.3
Lin, S.4
Page, D.5
Ristenpart, T.6
-
27
-
-
77956195013
-
Data mining with differential privacy
-
ACM, New York, NY, USA
-
Arik Friedman and Assaf Schuster. 2010. Data Mining with Differential Privacy. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '10). ACM, New York, NY, USA, 493-502. https://doi.org/10.1145/1835804.1835868
-
(2010)
Proceedings of the 16th ACM SIGKDD International Conference On Knowledge Discovery and Data Mining (KDD '10)
, pp. 493-502
-
-
Friedman, A.1
Schuster, A.2
-
28
-
-
85019568044
-
CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy
-
Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy. In Proceedings of The 33rd International Conference on Machine Learning. 201-210.
-
(2016)
Proceedings of the 33rd International Conference On Machine Learning
, pp. 201-210
-
-
Gilad-Bachrach, R.1
Dowlin, N.2
Laine, K.3
Lauter, K.4
Naehrig, M.5
Wernsing, J.6
-
29
-
-
0023545076
-
How to play ANY mental game
-
ACM, New York, NY, USA
-
O. Goldreich, S. Micali, and A. Wigderson. 1987. How to Play ANY Mental Game. In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing (STOC '87). ACM, New York, NY, USA, 218-229. https://doi.org/10.1145/28395. 28420
-
(1987)
Proceedings of the Nineteenth Annual ACM Symposium On Theory of Computing (STOC '87)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
31
-
-
84876012553
-
ML Confidential: Machine learning on encrypted data
-
Seoul, Korea, November 28-30 2012, Revised Selected Papers
-
Thore Graepel, Kristin E. Lauter, and Michael Naehrig. 2012. ML Confidential: Machine Learning on Encrypted Data. In Information Security and Cryptology-ICISC 2012-15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers. 1-21. http://dx.doi.org/10.1007/978-3-642-37682-5-1
-
(2012)
Information Security and Cryptology-ICISC 2012-15th International Conference
, pp. 1-21
-
-
Graepel, T.1
Lauter, K.E.2
Naehrig, M.3
-
32
-
-
85041438853
-
-
CoRR abs/1412.6071
-
Benjamin Graham. 2014. Fractional Max-Pooling. CoRR abs/1412.6071 (2014). http://arxiv.org/abs/1412.6071
-
(2014)
Fractional Max-Pooling
, vol.2014
-
-
Graham, B.1
-
37
-
-
84876231242
-
Imagenet classification with deep convolutional neural networks
-
F. Pereira C. J. C. Burges, L. Bottou, and K. Q.Weinberger (Eds.). Curran Associates, Inc
-
Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems 25, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q.Weinberger (Eds.). Curran Associates, Inc., 1097-1105. http://papers.nips.cc/paper/4824-imagenet-classification-with-deep-convolutional-neural-networks.pdf
-
(2012)
Advances in Neural Information Processing Systems
, vol.25
, pp. 1097-1105
-
-
Krizhevsky, A.1
Sutskever, I.2
Hinton, G.E.3
-
39
-
-
85067565710
-
Generalizing Pooling Functions in Convolutional Neural Networks: Mixed, gated, and tree
-
Cadiz, Spain, May 9-11 2016
-
Chen-Yu Lee, PatrickW. Gallagher, and Zhuowen Tu. 2016. Generalizing Pooling Functions in Convolutional Neural Networks: Mixed, Gated, and Tree. In Proceedings of the 19th International Conference on Artificial Intelligence and Statistics, AISTATS 2016, Cadiz, Spain, May 9-11, 2016. 464-472. http://jmlr.org/proceedings/papers/v51/lee16a.html
-
(2016)
Proceedings of the 19th International Conference On Artificial Intelligence and Statistics, AISTATS 2016
, pp. 464-472
-
-
Lee, C.-Y.1
Gallagher, P.W.2
Tu, Z.3
-
40
-
-
33646887390
-
On the limited memory BFGS method for large scale optimization
-
1989
-
Dong C Liu and Jorge Nocedal. 1989. On the limited memory BFGS method for large scale optimization. Mathematical programming 45, 1 (1989), 503-528.
-
(1989)
Mathematical Programming
, vol.45
, Issue.1
, pp. 503-528
-
-
Liu, D.C.1
Nocedal, J.2
-
41
-
-
34249852033
-
Building a large annotated corpus of English: The penn treebank
-
1993
-
Mitchell P Marcus, Mary Ann Marcinkiewicz, and Beatrice Santorini. 1993. Building a large annotated corpus of English: The Penn Treebank. Computational linguistics 19, 2 (1993), 313-330.
-
(1993)
Computational Linguistics
, vol.19
, Issue.2
, pp. 313-330
-
-
Marcus, M.P.1
Ann Marcinkiewicz, M.2
Santorini, B.3
-
44
-
-
85024487501
-
SecureML: A system for scalable Privacy-Preserving machine learning
-
IEEE
-
Payman Mohassel and Yupeng Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In IEEE Symposium on Security and Privacy (S&P'17). IEEE. http://ieeexplore.ieee.org/document/7958569.
-
(2017)
IEEE Symposium On Security and Privacy (S&P'17)
-
-
Mohassel, P.1
Zhang, Y.2
-
46
-
-
85068879161
-
Oblivious Multi-Party machine learning on trusted processors
-
USENIX Association, Austin, TX
-
Olga Ohrimenko, Felix Schuster, Cedric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 619-636. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/ohrimenko
-
(2016)
25th USENIX Security Symposium (USENIX Security 16)
, pp. 619-636
-
-
Ohrimenko, O.1
Schuster, F.2
Fournet, C.3
Mehta, A.4
Nowozin, S.5
Vaswani, K.6
Costa, M.7
-
47
-
-
36949019777
-
Oblivious neural network computing via Homomorphic encryption
-
Jan 2007
-
C. Orlandi, A. Piva, and M. Barni. 2007. Oblivious Neural Network Computing via Homomorphic Encryption. EURASIP J. Inf. Secur. 2007, Article 18 (Jan. 2007), 10 pages. https://doi.org/10.1155/2007/37343
-
(2007)
EURASIP J. Inf. Secur
, vol.2007
, pp. 10
-
-
Orlandi, C.1
Piva, A.2
Barni, M.3
-
48
-
-
84942550998
-
Public-Key cryptosystems based on composite degree residuosity classes
-
Jacques Stern (Ed.) Springer
-
Pascal Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In EUROCRYPT (LNCS), Jacques Stern (Ed.), Vol. 1592. Springer, 223-238. https://doi.org/10.1007/3-540-48910-X-16
-
(1999)
EUROCRYPT (LNCS)
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
49
-
-
84950290695
-
Combining secret sharing and garbled circuits for efficient private
-
BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30 2015, Revised Selected Papers
-
Pille Pullonen and Sander Siim. 2015. Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations. In Financial Cryptography and Data Security-FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers. 172-183. https://doi.org/10.1007/978-3-662-48051-9-13
-
(2015)
IEEE 754 Floating-Point Computations. in Financial Cryptography and Data Security-FC 2015 International Workshops
, pp. 172-183
-
-
Pullonen, P.1
Siim, S.2
-
52
-
-
84954108845
-
Privacy-Preserving deep learning
-
ACM, New York, NY, USA
-
Reza Shokri and Vitaly Shmatikov. 2015. Privacy-Preserving Deep Learning. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15). ACM, New York, NY, USA, 1310-1321. https://doi.org/10.1145/2810103.2813687
-
(2015)
Proceedings of the 22Nd ACM SIGSAC Conference On Computer and Communications Security (CCS '15)
, pp. 1310-1321
-
-
Shokri, R.1
Shmatikov, V.2
-
53
-
-
85024479480
-
Membership inference attacks against machine learning models
-
SP 2017, San Jose, CA, USA, May 22-26 2017 IEEE
-
Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017. IEEE, 3-18. https://doi.org/10.1109/SP.2017.41
-
(2017)
2017 IEEE Symposium On Security and Privacy
, pp. 3-18
-
-
Shokri, R.1
Stronati, M.2
Song, C.3
Shmatikov, V.4
-
54
-
-
84894656653
-
Fully homomorphic SIMD operations
-
2014
-
N. P. Smart and F. Vercauteren. 2014. Fully homomorphic SIMD operations. Designs, Codes and Cryptography 71, 1 (2014), 57-81. https://doi.org/10.1007/s10623-012-9720-4
-
(2014)
Designs Codes and Cryptography
, vol.71
, Issue.1
, pp. 57-81
-
-
Smart, N.P.1
Vercauteren, F.2
-
56
-
-
85029450982
-
Stealing machine learning models via prediction APIs
-
USENIX Association, Austin, TX
-
Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction APIs. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 601-618. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tramer
-
(2016)
25th USENIX Security Symposium (USENIX Security 16)
, pp. 601-618
-
-
Tramèr, F.1
Zhang, F.2
Juels, A.3
Reiter, M.K.4
Ristenpart, T.5
-
57
-
-
84897550107
-
Regularization of neural networks using dropconnect
-
Sanjoy Dasgupta and David Mcallester (Eds.). JMLRWorkshop and Conference Proceedings
-
Li Wan, Matthew Zeiler, Sixin Zhang, Yann L. Cun, and Rob Fergus. 2013. Regularization of Neural Networks using DropConnect. In Proceedings of the 30th International Conference on Machine Learning (ICML-13), Sanjoy Dasgupta and David Mcallester (Eds.). JMLRWorkshop and Conference Proceedings, 1058-1066. http://jmlr.org/proceedings/papers/v28/wan13.pdf
-
(2013)
Proceedings of the 30th International Conference On Machine Learning (ICML-13)
, pp. 1058-1066
-
-
Wan, L.1
Zeiler, M.2
Zhang, S.3
Cun, Y.L.4
Fergus, R.5
-
58
-
-
85029574773
-
Privately evaluating decision trees and random forests
-
2016
-
David J. Wu, Tony Feng, Michael Naehrig, and Kristin E. Lauter. 2016. Privately Evaluating Decision Trees and Random Forests. Privacy Enhancing Technologies (PoPETs) 2016, 4 (2016), 335-355. http://dx.doi.org/10.1515/popets-2016-0043
-
(2016)
Privacy Enhancing Technologies (PoPETs)
, vol.2016
, Issue.4
, pp. 335-355
-
-
Wu, D.J.1
Feng, T.2
Naehrig, M.3
Lauter, K.E.4
-
59
-
-
0020312165
-
Protocols for secure computations (Extended Abstract)
-
IEEE
-
Andrew Chi-Chih Yao. 1982. Protocols for Secure Computations (Extended Abstract). In Foundations of Computer Science (FOCS'82). IEEE, 160-164.
-
(1982)
Foundations of Computer Science (FOCS'82)
, pp. 160-164
-
-
Yao, A.C.-C.1
|