搜索结果: 1-15 共查到“军事学 S-P network”相关记录68条 . 查询时间(0.095 秒)
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data
Privacy-Preserving Machine Learning Deep Learning Graph Compilers
2019/8/21
In previous work, Boemer et al. introduced nGraph-HE, an extension to the Intel nGraph deep learning (DL) compiler, that en- ables data scientists to deploy models with popular frameworks such as Tens...
A Composable Security Treatment of the Lightning Network
blockchain scalability universal composition
2019/7/10
The high latency and low throughput of blockchain protocols constitute one of the fundamental barriers for their wider adoption.Overlay protocols, notably the lightning network, have been touted asthe...
Neural Network Model Assessment for Side-Channel Analysis
Side-Channel Analysis Neural Networks Model Assessment
2019/6/19
Leakage assessment of cryptographic implementations with side-channel analysis relies on two important assumptions: leakage model and the number of side-channel traces. In the context of profiled side...
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference
multi-key homomorphic encryption packed ciphertext ring learning with errors
2019/5/21
Homomorphic Encryption (HE) is a cryptosystem which supports computation on encrypted data. López-Alt et al. (STOC 2012) proposed a generalized notion of HE, called Multi-Key Homomorphic Encryption (M...
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks
fault attack neural network deep learning
2019/5/13
Deep learning is becoming a basis of decision making systems in many application domains, such as autonomous vehicles, health systems, etc., where the risk of misclassification can lead to serious con...
Privacy-Preserving Network Path Validation
Network path validation Path privacy Index privacy
2019/4/23
The end-users communicating over a network path currently have no control over the path. For a better quality of service, the source node often opts for a superior (or premium) network path in order t...
As of 12th January 2019, Monero is ranked as the first privacy-preserving cryptocurrency by market capitalization, and the 14th among all cryptocurrencies. This paper aims at improving the understandi...
Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers
Unlinkability Privacy Advertising
2019/4/11
Online Social Networks (OSNs) offer free storage and social networking services through which users can communicate personal information with one another. The personal information of the users collect...
On the Difficulty of Hiding the Balance of Lightning Network Channels
Bitcoin Blockchain Network Security
2019/4/1
The Lightning Network is a second layer technology running on top of Bitcoin and other Blockchains. It is composed of a peer-to-peer network, used to transfer raw information data. Some of the links i...
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
Side-Channel Attacks Deep Learning Machine Learning
2019/2/26
Deep Neural Networks (DNNs) have recently received significant attention in the side-channel community due to their state-of-the-art performance in security testing of embedded systems. However, resea...
XONN: XNOR-based Oblivious Deep Neural Network Inference
Privacy-Preserving Machine Learning Deep Learning Oblivious Inference
2019/2/25
Advancements in deep learning enable cloud servers to provide inference-as-a-service for clients. In this scenario, clients send their raw data to the server to run the deep learning model and send ba...
复旦大学计算机科学与技术学院信息安全课件 Network Security and Firewalls
复旦大学计算机科学与技术学院 信息安全 课件 Network Security and Firewalls
2018/7/20
复旦大学计算机科学与技术学院信息安全课件 Network Security and Firewalls。
In response to upcoming performance and security challenges of anonymity networks like Tor, it will be of crucial importance to be able to develop and deploy performance improvements and state-of-the-...
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information
Side-channel Analysis Artificial Neural Networks Power
2018/5/28
Machine learning has become mainstream across industries. In this work we pose the following question: Is it possible to reverse engineer a neural network by using only side-channel information? We an...
SecureNN: Efficient and Private Neural Network Training
secure computation neural network training information-theoretic security
2018/5/15
Neural Networks (NN) provide a powerful method for machine learning training and prediction. For effective training, it is often desirable for multiple parties to combine their data -- however, doing ...