메뉴 건너뛰기




Volumn , Issue , 2017, Pages 619-631

Oblivious neural network predictions via MiniONN transformations

Author keywords

Machine Learning; Neural Network Predictions; Privacy; Secure Twoparty Computation

Indexed keywords

ARTIFICIAL INTELLIGENCE; DATA PRIVACY; FORECASTING; LEARNING SYSTEMS;

EID: 85041445426     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/3133956.3134056     Document Type: Conference Paper
Times cited : (701)

References (61)
  • 2
    • 85075670920 scopus 로고    scopus 로고
    • TensorFlow: A system for Large-Scale machine learning
    • USENIX Association, GA
    • Martín Abadi et al. 2016. TensorFlow: A System for Large-Scale Machine Learning. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, GA, 265-283. https://www.usenix.org/conference/osdi16/technical-sessions/presentation/abadi
    • (2016) 12th USENIX Symposium On Operating Systems Design and Implementation (OSDI 16) , pp. 265-283
    • Abadi, M.1
  • 6
    • 70350399649 scopus 로고    scopus 로고
    • Secure evaluation of private linear branching programs with medical applications
    • Springer, Saint-Malo, France
    • Mauro Barni et al. 2009. Secure Evaluation of Private Linear Branching Programs with Medical Applications. In Computer Security-ESORICS 2009, 14th European Symposium on Research in Computer Security. Springer, Saint-Malo, France, 424-439. http://dx.doi.org/10.1007/978-3-642-04444-1-26
    • (2009) Computer Security-ESORICS 2009, 14th European Symposium On Research in Computer Security , pp. 424-439
    • Barni, M.1
  • 8
    • 84933507780 scopus 로고
    • Efficient multiparty protocols using circuit randomization
    • Santa Barbara, California, USA, August 11-15, 1991, Proceedings (Lecture Notes in Computer Science) Springer
    • Donald Beaver. 1991. Efficient Multiparty Protocols Using Circuit Randomization. In Advances in Cryptology-CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings (Lecture Notes in Computer Science), Vol. 576. Springer, 420-432. https://doi.org/10.1007/3-540-46766-1-34
    • (1991) Advances in Cryptology-CRYPTO '91, 11th Annual International Cryptology Conference , vol.576 , pp. 420-432
    • Beaver, D.1
  • 9
    • 84856673205 scopus 로고    scopus 로고
    • Theano: A CPU and GPU math compiler in Python
    • James Bergstra et al. 2010. Theano: A CPU and GPU math compiler in Python. In Proc. 9th Python in Science Conf. 1-7.
    • (2010) Proc. 9th Python in Science Conf , pp. 1-7
    • Bergstra, J.1
  • 14
    • 85098887199 scopus 로고    scopus 로고
    • Machine learning classification over encrypted data
    • San Diego, California, USA, February 8-11 2015
    • Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser. 2015. Machine Learning Classification over Encrypted Data. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8-11, 2015. http://www.internetsociety.org/doc/machine-learning-classification-over-encrypted-data
    • (2015) 22nd Annual Network and Distributed System Security Symposium, NDSS 2015
    • Bost, R.1    Ada Popa, R.2    Tu, S.3    Goldwasser, S.4
  • 20
    • 84055222005 scopus 로고    scopus 로고
    • Context-Dependent Pre-Trained deep neural networks for Large-Vocabulary speech recognition
    • Jan 2012
    • G. E. Dahl, D. Yu, L. Deng, and A. Acero. 2012. Context-Dependent Pre-Trained Deep Neural Networks for Large-Vocabulary Speech Recognition. IEEE Transactions on Audio, Speech, and Language Processing 20, 1 (Jan 2012), 30-42. https://doi.org/10.1109/TASL.2011.2134090
    • (2012) IEEE Transactions On Audio Speech, and Language Processing , vol.20 , Issue.1 , pp. 30-42
    • Dahl, G.E.1    Yu, D.2    Deng, L.3    Acero, A.4
  • 24
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Springer
    • Taher ElGamal. 1985. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In CRYPTO (LNCS), Vol. 196. Springer, 10-18. https://doi.org/10.1007/3-540-39568-7-2
    • (1985) CRYPTO (LNCS) , vol.196 , pp. 10-18
    • ElGamal, T.1
  • 26
    • 85055873696 scopus 로고    scopus 로고
    • Privacy in Pharmacogenetics: An End-to-End case study of personalized warfarin dosing
    • USENIX Association
    • Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart. 2014. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, 17-32. https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/fredrikson-matthew
    • (2014) 23rd USENIX Security Symposium (USENIX Security 14) , pp. 17-32
    • Fredrikson, M.1    Lantz, E.2    Jha, S.3    Lin, S.4    Page, D.5    Ristenpart, T.6
  • 31
    • 84876012553 scopus 로고    scopus 로고
    • ML Confidential: Machine learning on encrypted data
    • Seoul, Korea, November 28-30 2012, Revised Selected Papers
    • Thore Graepel, Kristin E. Lauter, and Michael Naehrig. 2012. ML Confidential: Machine Learning on Encrypted Data. In Information Security and Cryptology-ICISC 2012-15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers. 1-21. http://dx.doi.org/10.1007/978-3-642-37682-5-1
    • (2012) Information Security and Cryptology-ICISC 2012-15th International Conference , pp. 1-21
    • Graepel, T.1    Lauter, K.E.2    Naehrig, M.3
  • 32
    • 85041438853 scopus 로고    scopus 로고
    • CoRR abs/1412.6071
    • Benjamin Graham. 2014. Fractional Max-Pooling. CoRR abs/1412.6071 (2014). http://arxiv.org/abs/1412.6071
    • (2014) Fractional Max-Pooling , vol.2014
    • Graham, B.1
  • 33
    • 0031573117 scopus 로고    scopus 로고
    • Long short-term memory
    • 1997
    • Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735-1780.
    • (1997) Neural Computation , vol.9 , Issue.8 , pp. 1735-1780
    • Hochreiter, S.1    Schmidhuber, J.2
  • 37
    • 84876231242 scopus 로고    scopus 로고
    • Imagenet classification with deep convolutional neural networks
    • F. Pereira C. J. C. Burges, L. Bottou, and K. Q.Weinberger (Eds.). Curran Associates, Inc
    • Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems 25, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q.Weinberger (Eds.). Curran Associates, Inc., 1097-1105. http://papers.nips.cc/paper/4824-imagenet-classification-with-deep-convolutional-neural-networks.pdf
    • (2012) Advances in Neural Information Processing Systems , vol.25 , pp. 1097-1105
    • Krizhevsky, A.1    Sutskever, I.2    Hinton, G.E.3
  • 40
    • 33646887390 scopus 로고
    • On the limited memory BFGS method for large scale optimization
    • 1989
    • Dong C Liu and Jorge Nocedal. 1989. On the limited memory BFGS method for large scale optimization. Mathematical programming 45, 1 (1989), 503-528.
    • (1989) Mathematical Programming , vol.45 , Issue.1 , pp. 503-528
    • Liu, D.C.1    Nocedal, J.2
  • 41
    • 34249852033 scopus 로고
    • Building a large annotated corpus of English: The penn treebank
    • 1993
    • Mitchell P Marcus, Mary Ann Marcinkiewicz, and Beatrice Santorini. 1993. Building a large annotated corpus of English: The Penn Treebank. Computational linguistics 19, 2 (1993), 313-330.
    • (1993) Computational Linguistics , vol.19 , Issue.2 , pp. 313-330
    • Marcus, M.P.1    Ann Marcinkiewicz, M.2    Santorini, B.3
  • 44
    • 85024487501 scopus 로고    scopus 로고
    • SecureML: A system for scalable Privacy-Preserving machine learning
    • IEEE
    • Payman Mohassel and Yupeng Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In IEEE Symposium on Security and Privacy (S&P'17). IEEE. http://ieeexplore.ieee.org/document/7958569.
    • (2017) IEEE Symposium On Security and Privacy (S&P'17)
    • Mohassel, P.1    Zhang, Y.2
  • 47
    • 36949019777 scopus 로고    scopus 로고
    • Oblivious neural network computing via Homomorphic encryption
    • Jan 2007
    • C. Orlandi, A. Piva, and M. Barni. 2007. Oblivious Neural Network Computing via Homomorphic Encryption. EURASIP J. Inf. Secur. 2007, Article 18 (Jan. 2007), 10 pages. https://doi.org/10.1155/2007/37343
    • (2007) EURASIP J. Inf. Secur , vol.2007 , pp. 10
    • Orlandi, C.1    Piva, A.2    Barni, M.3
  • 48
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key cryptosystems based on composite degree residuosity classes
    • Jacques Stern (Ed.) Springer
    • Pascal Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In EUROCRYPT (LNCS), Jacques Stern (Ed.), Vol. 1592. Springer, 223-238. https://doi.org/10.1007/3-540-48910-X-16
    • (1999) EUROCRYPT (LNCS) , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 49
    • 84950290695 scopus 로고    scopus 로고
    • Combining secret sharing and garbled circuits for efficient private
    • BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30 2015, Revised Selected Papers
    • Pille Pullonen and Sander Siim. 2015. Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations. In Financial Cryptography and Data Security-FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers. 172-183. https://doi.org/10.1007/978-3-662-48051-9-13
    • (2015) IEEE 754 Floating-Point Computations. in Financial Cryptography and Data Security-FC 2015 International Workshops , pp. 172-183
    • Pullonen, P.1    Siim, S.2
  • 53
    • 85024479480 scopus 로고    scopus 로고
    • Membership inference attacks against machine learning models
    • SP 2017, San Jose, CA, USA, May 22-26 2017 IEEE
    • Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017. IEEE, 3-18. https://doi.org/10.1109/SP.2017.41
    • (2017) 2017 IEEE Symposium On Security and Privacy , pp. 3-18
    • Shokri, R.1    Stronati, M.2    Song, C.3    Shmatikov, V.4
  • 54
    • 84894656653 scopus 로고    scopus 로고
    • Fully homomorphic SIMD operations
    • 2014
    • N. P. Smart and F. Vercauteren. 2014. Fully homomorphic SIMD operations. Designs, Codes and Cryptography 71, 1 (2014), 57-81. https://doi.org/10.1007/s10623-012-9720-4
    • (2014) Designs Codes and Cryptography , vol.71 , Issue.1 , pp. 57-81
    • Smart, N.P.1    Vercauteren, F.2
  • 56
    • 85029450982 scopus 로고    scopus 로고
    • Stealing machine learning models via prediction APIs
    • USENIX Association, Austin, TX
    • Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction APIs. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 601-618. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tramer
    • (2016) 25th USENIX Security Symposium (USENIX Security 16) , pp. 601-618
    • Tramèr, F.1    Zhang, F.2    Juels, A.3    Reiter, M.K.4    Ristenpart, T.5
  • 57
    • 84897550107 scopus 로고    scopus 로고
    • Regularization of neural networks using dropconnect
    • Sanjoy Dasgupta and David Mcallester (Eds.). JMLRWorkshop and Conference Proceedings
    • Li Wan, Matthew Zeiler, Sixin Zhang, Yann L. Cun, and Rob Fergus. 2013. Regularization of Neural Networks using DropConnect. In Proceedings of the 30th International Conference on Machine Learning (ICML-13), Sanjoy Dasgupta and David Mcallester (Eds.). JMLRWorkshop and Conference Proceedings, 1058-1066. http://jmlr.org/proceedings/papers/v28/wan13.pdf
    • (2013) Proceedings of the 30th International Conference On Machine Learning (ICML-13) , pp. 1058-1066
    • Wan, L.1    Zeiler, M.2    Zhang, S.3    Cun, Y.L.4    Fergus, R.5
  • 58
    • 85029574773 scopus 로고    scopus 로고
    • Privately evaluating decision trees and random forests
    • 2016
    • David J. Wu, Tony Feng, Michael Naehrig, and Kristin E. Lauter. 2016. Privately Evaluating Decision Trees and Random Forests. Privacy Enhancing Technologies (PoPETs) 2016, 4 (2016), 335-355. http://dx.doi.org/10.1515/popets-2016-0043
    • (2016) Privacy Enhancing Technologies (PoPETs) , vol.2016 , Issue.4 , pp. 335-355
    • Wu, D.J.1    Feng, T.2    Naehrig, M.3    Lauter, K.E.4
  • 59
    • 0020312165 scopus 로고
    • Protocols for secure computations (Extended Abstract)
    • IEEE
    • Andrew Chi-Chih Yao. 1982. Protocols for Secure Computations (Extended Abstract). In Foundations of Computer Science (FOCS'82). IEEE, 160-164.
    • (1982) Foundations of Computer Science (FOCS'82) , pp. 160-164
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.