Huang et al., 2023 - Google Patents
SecureTVM: A TVM-based compiler framework for selective privacy-preserving neural inferenceHuang et al., 2023
- Document ID
- 9133740447275914647
- Author
- Huang P
- Tu C
- Chung S
- Wu P
- Tsai T
- Lin Y
- Dai C
- Liao T
- Publication year
- Publication venue
- ACM Transactions on Design Automation of Electronic Systems
External Links
Snippet
Privacy-preserving neural inference helps protect both the user input data and the model weights from being leaked to others during the inference of a deep learning model. To achieve data protection, the inference is often performed within a secure domain, and the …
- 230000001537 neural 0 title abstract description 84
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/4421—Execution paradigms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
- G06F8/41—Compilation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Viand et al. | SoK: Fully homomorphic encryption compilers | |
| Cabrero-Holgueras et al. | SoK: Privacy-preserving computation techniques for deep learning | |
| Boemer et al. | nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data | |
| Araki et al. | Generalizing the SPDZ compiler for other protocols | |
| US20210397988A1 (en) | Depth-constrained knowledge distillation for inference on encrypted data | |
| Chen et al. | Developing privacy-preserving AI systems: The lessons learned | |
| Cheng et al. | Towards federated large language models: Motivations, methods, and future directions | |
| Gamiz et al. | Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations | |
| Chen et al. | Nisq quantum computing: A security-centric tutorial and survey [feature] | |
| Huang et al. | SecureTVM: A TVM-based compiler framework for selective privacy-preserving neural inference | |
| Zhu et al. | SecureBiNN: 3-party secure computation for binarized neural network inference | |
| Rouhani et al. | ReDCrypt: real-time privacy-preserving deep learning inference in clouds using FPGAs | |
| Sedghighadikolaei et al. | Privacy-preserving and trustworthy deep learning for medical imaging | |
| Cabrero-Holgueras et al. | HEFactory: A symbolic execution compiler for privacy-preserving Deep Learning with Homomorphic Encryption | |
| Cortés-Mendoza et al. | Privacy-preserving logistic regression as a cloud service based on residue number system | |
| Huang et al. | Efficient privacy-preserving machine learning with lightweight trusted hardware | |
| Islam et al. | Compact: Approximating complex activation functions for secure computation | |
| Taiello et al. | Enhancing Privacy in Federated Learning: Secure Aggregation for Real-World Healthcare Applications | |
| Bian et al. | CHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction | |
| Ünal et al. | A privacy-preserving approach for cloud-based protein fold recognition | |
| Sultanow et al. | Quantum Agents | |
| Upadhyay et al. | Quantum data breach: Reusing training dataset by untrusted quantum clouds | |
| Ziegeldorf et al. | SHIELD: A framework for efficient and secure machine learning classification in constrained environments | |
| Shrestha et al. | Secure Multiparty Generative AI | |
| Sawant | Enhancing encryption in cloud computing and reducing energy usage by using PSO-ALO algorithm to improve homomorphic encryption technique |