Secure and verifiable inference in deep neural networks
Outsourced inference service has enormously promoted the popularity of deep learning, and
helped users to customize a range of personalized applications. However, it also entails a …
helped users to customize a range of personalized applications. However, it also entails a …
Shadownet: A secure and efficient on-device model inference system for convolutional neural networks
With the increased usage of AI accelerators on mobile and edge devices, on-device
machine learning (ML) is gaining popularity. Thousands of proprietary ML models are being …
machine learning (ML) is gaining popularity. Thousands of proprietary ML models are being …
On polynomial approximations for privacy-preserving and verifiable relu networks
Outsourcing deep neural networks (DNNs) inference tasks to an untrusted cloud raises data
privacy and integrity concerns. While there are many techniques to ensure privacy and …
privacy and integrity concerns. While there are many techniques to ensure privacy and …
Towards privacy-preserving deep learning: opportunities and challenges
During the past decade, deep learning has achieved excellent results in many classic
machine learning problems, such as face recognition, spam detection, and financial …
machine learning problems, such as face recognition, spam detection, and financial …
SESAME: Software defined enclaves to secure inference accelerators with multi-tenant execution
Hardware-enclaves that target complex CPU designs compromise both security and
performance. Programs have little control over micro-architecture, which leads to side …
performance. Programs have little control over micro-architecture, which leads to side …
Efficient Inference for Pruned CNN Models on Mobile Devices With Holistic Sparsity Alignment
Many artificial intelligence applications based on convolutional neural networks are directly
deployed on mobile devices to avoid network unavailability and user privacy leakage …
deployed on mobile devices to avoid network unavailability and user privacy leakage …
VeriORouting: Verification on intelligent routing outsourced to the cloud
Current research on machine learning-based intelligent routing focuses on algorithm design
and performance optimization. How to deploy it in practice remains a pressing issue …
and performance optimization. How to deploy it in practice remains a pressing issue …
VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection
Machine learning as a service (MLaaS) offers users the benefit of training state-of-the-art
neural network models on fast hardware with low costs. However, it also brings security …
neural network models on fast hardware with low costs. However, it also brings security …
Verifying outsourced computation in an edge computing marketplace
C Harth-Kitzerow, GM Garrido - arXiv preprint arXiv:2203.12347, 2022 - arxiv.org
An edge computing marketplace could enable IoT devices (Outsourcers) to outsource
computation to any participating node (Contractors) in their proximity. In return, these nodes …
computation to any participating node (Contractors) in their proximity. In return, these nodes …
[PDF][PDF] Bident Structure for Neural Network Model Protection.
Deep neural networks are widely deployed in a variety of application areas to provide real-
time inference services, such as mobile phones, autonomous vehicles and industrial …
time inference services, such as mobile phones, autonomous vehicles and industrial …