☆16Aug 31, 2021Updated 4 years ago
Alternatives and similar repositories for COINN
Users that are interested in COINN are comparing it to the libraries listed below
Sorting:
- A crypto-assisted framework for protecting the privacy of models and queries in inference.☆19Oct 28, 2021Updated 4 years ago
- Python package for ML developers and researchers to change certain variables while their code is executing to make the task of training a…☆11Apr 25, 2024Updated last year
- Privacy -preserving Neural Networks☆79Dec 21, 2018Updated 7 years ago
- ☆215Feb 25, 2025Updated last year
- CryptoNets using Python and ctypes. This repository is part of the final project of Neural Networks at Sapienza University of Rome.☆24Oct 9, 2019Updated 6 years ago
- PRODeep: A Platform for Robustness Verification of Deep Neural Networks☆12Nov 11, 2020Updated 5 years ago
- Privacy-preserving Deep Learning based on homomorphic encryption (HE)☆35Nov 8, 2021Updated 4 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Dec 1, 2021Updated 4 years ago
- BlockCIrculantRNN (LSTM and GRU) using TensorFlow☆14Oct 30, 2018Updated 7 years ago
- ☆19Mar 9, 2024Updated 2 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Jan 1, 2021Updated 5 years ago
- Pensieve on python 3.8 & tensorflow 2.7☆22Dec 27, 2021Updated 4 years ago
- Implementation of a Neural Network that predicts encrypted handwritten digits from the MNIST dataset. Encryption and Network Implemented …☆12Mar 10, 2019Updated 7 years ago
- Privacy-Preserving Convolutional Neural Networks using Homomorphic Encryption☆83Jul 23, 2024Updated last year
- This repository provides python code for privacy preserving image classification based on fully homomorphic encryption (FHE).☆12Sep 20, 2019Updated 6 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆24Mar 14, 2022Updated 4 years ago
- ☆67Sep 16, 2018Updated 7 years ago
- Certifying Geometric Robustness of Neural Networks☆16Mar 24, 2023Updated 2 years ago
- Homomorphic matrix computation☆43Aug 7, 2019Updated 6 years ago
- Interoperable Private Attribution (IPA) - A Private Measurement Proposal☆43Feb 9, 2025Updated last year
- Circuit Synthesis for Yao's Garbled Circuit by TinyGarble☆11Sep 25, 2020Updated 5 years ago
- Code for Federated Neuromorphic Learning of Spiking Neural Networks for Low-Power Edge Intelligence☆17Dec 9, 2020Updated 5 years ago
- ☆13Aug 29, 2024Updated last year
- [CVPR 2023] "TrojViT: Trojan Insertion in Vision Transformers" by Mengxin Zheng, Qian Lou, Lei Jiang☆14Jan 5, 2024Updated 2 years ago
- Secure Inference Resilient Against Malicious Clients☆14May 3, 2022Updated 3 years ago
- Implementation of a simple linear regression algorithm in MAMBA☆10Feb 12, 2020Updated 6 years ago
- Code repository of the paper "Alleviating Adversarial Attacks on Variational Autoencoders with MCMC" published at NeurIPS 2022. https://a…☆10Dec 14, 2022Updated 3 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- Crytpocurrency Course☆14Updated this week
- ☆14Oct 15, 2017Updated 8 years ago
- Official Implementation of the CVPR'23 paper 'Regularization of polynomial networks for image recognition'.☆10Jun 8, 2023Updated 2 years ago
- ☆16Mar 3, 2025Updated last year
- ☆18Mar 15, 2025Updated last year
- This is a personal blogging system based on the SSM framework.☆14Dec 16, 2022Updated 3 years ago
- 使用随机森林模型预测股价趋势(涉及数据预处理)☆10Jun 22, 2018Updated 7 years ago
- ☆13Sep 28, 2024Updated last year
- Optimized implementations of the Number Theoretic Transform (NTT) algorithm for the ring R/(X^N + 1) where N=2^m.☆26Nov 23, 2021Updated 4 years ago
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- Unifew: Unified Fewshot Learning Model☆18Sep 10, 2021Updated 4 years ago