Secure and verifiable inference in deep neural networks

G Xu, H Li, H Ren, J Sun, S Xu, J Ning, H Yang… - Proceedings of the 36th …, 2020 - dl.acm.org
Outsourced inference service has enormously promoted the popularity of deep learning, and
helped users to customize a range of personalized applications. However, it also entails a …

Shadownet: A secure and efficient on-device model inference system for convolutional neural networks

Z Sun, R Sun, C Liu, AR Chowdhury… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
With the increased usage of AI accelerators on mobile and edge devices, on-device
machine learning (ML) is gaining popularity. Thousands of proprietary ML models are being …

On polynomial approximations for privacy-preserving and verifiable relu networks

RE Ali, J So, AS Avestimehr - arXiv preprint arXiv:2011.05530, 2020 - arxiv.org
Outsourcing deep neural networks (DNNs) inference tasks to an untrusted cloud raises data
privacy and integrity concerns. While there are many techniques to ensure privacy and …

Towards privacy-preserving deep learning: opportunities and challenges

S Ali, MM Irfan, A Bomai, C Zhao - 2020 IEEE 7th International …, 2020 - ieeexplore.ieee.org
During the past decade, deep learning has achieved excellent results in many classic
machine learning problems, such as face recognition, spam detection, and financial …

SESAME: Software defined enclaves to secure inference accelerators with multi-tenant execution

S Banerjee, P Ramrakhyani, S Wei, M Tiwari - arXiv preprint arXiv …, 2020 - arxiv.org
Hardware-enclaves that target complex CPU designs compromise both security and
performance. Programs have little control over micro-architecture, which leads to side …

Efficient Inference for Pruned CNN Models on Mobile Devices With Holistic Sparsity Alignment

Y Jin, R Zhong, S Long, J Zhai - IEEE Transactions on Parallel …, 2024 - ieeexplore.ieee.org
Many artificial intelligence applications based on convolutional neural networks are directly
deployed on mobile devices to avoid network unavailability and user privacy leakage …

VeriORouting: Verification on intelligent routing outsourced to the cloud

H Bai, X Yu, Z Yan, J Zhang, LT Yang - Information Sciences, 2023 - Elsevier
Current research on machine learning-based intelligent routing focuses on algorithm design
and performance optimization. How to deploy it in practice remains a pressing issue …

VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection

X Zhang, Y Zhang, Y Zhang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Machine learning as a service (MLaaS) offers users the benefit of training state-of-the-art
neural network models on fast hardware with low costs. However, it also brings security …

Verifying outsourced computation in an edge computing marketplace

C Harth-Kitzerow, GM Garrido - arXiv preprint arXiv:2203.12347, 2022 - arxiv.org
An edge computing marketplace could enable IoT devices (Outsourcers) to outsource
computation to any participating node (Contractors) in their proximity. In return, these nodes …

[PDF][PDF] Bident Structure for Neural Network Model Protection.

HY Lin, C Fang, J Shi - ICISSP, 2020 - pdfs.semanticscholar.org
Deep neural networks are widely deployed in a variety of application areas to provide real-
time inference services, such as mobile phones, autonomous vehicles and industrial …