Design method of secure computing protocol for deep neural network
Aiming at the information leakage problem in the process of deep neural network model calculation,a series of secure and efficient interactive computing protocols were designed between two non-collusive edge servers in combination with the additive secret sharing scheme.Since the nonlinear function...
Saved in:
Main Authors: | Renwan BI, Qianxin CHEN, Jinbo XIONG, Ximeng LIU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2020-08-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020050 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Towards edge-collaborative,lightweight and secure region proposal network
by: Jinbo XIONG, et al.
Published: (2020-10-01) -
Towards edge-collaborative, lightweight and privacy-preserving classification framework
by: Jinbo XIONG, et al.
Published: (2022-01-01) -
Design of shuffling protocol based on additive secret sharing
by: ZHANG Yanshuo, et al.
Published: (2024-08-01) -
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
by: XU Jing-fang1, et al.
Published: (2009-01-01) -
ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data
by: Xiangyi Meng, et al.
Published: (2025-01-01)