Privacy-Preserving, Accurate and Efficient Inference for Transformers
☆33Jun 3, 2024Updated last year
Alternatives and similar repositories for BOLT
Users that are interested in BOLT are comparing it to the libraries listed below
Sorting:
- ☆10May 27, 2024Updated last year
- The repo of "BumbleBee: Secure Two-party Inference Framework for Large Transformers" (NDSS 2025)☆53Feb 3, 2025Updated last year
- Automatic ReLU Reduction☆15Dec 20, 2023Updated 2 years ago
- code repo for paper accepted in ICML 2023☆14Oct 19, 2023Updated 2 years ago
- ☆215Feb 25, 2025Updated last year
- Non-interactive protocol for secure transformer inference based on RNS-CKKS.☆132Sep 20, 2024Updated last year
- Official Implementation of "LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference"☆24Nov 12, 2023Updated 2 years ago
- Experimental Code for Private Decision Tree Evaluation☆16Sep 12, 2023Updated 2 years ago
- ☆16Mar 3, 2025Updated 11 months ago
- Paper list of federated learning: About system design☆13Apr 13, 2022Updated 3 years ago
- Code release for MPCViT accepted by ICCV 2023☆16Jan 6, 2025Updated last year
- Private Inference on Transformer☆30Jun 13, 2023Updated 2 years ago
- Research Artifact of USENIX Security 2023 Paper: Precise and Generalized Robustness Certification for Neural Networks☆13Jun 20, 2023Updated 2 years ago
- A reading list for homomorphic encryption☆135Nov 30, 2025Updated 3 months ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆31Feb 26, 2023Updated 3 years ago
- Implementation of deep ResNet model on CKKS scheme in Microsoft SEAL library using multiplexed parallel convolution☆101Jul 27, 2022Updated 3 years ago
- (ICLR 2023 Spotlight) MPCFormer: fast, performant, and private transformer inference with MPC☆102Jun 12, 2023Updated 2 years ago
- The implementation of "Efficient Scalable Multi-Party Private Set Intersection(-Variants) from Bicentric Zero-Sharing"☆18Aug 20, 2025Updated 6 months ago
- Optimized implementations of the Number Theoretic Transform (NTT) algorithm for the ring R/(X^N + 1) where N=2^m.☆26Nov 23, 2021Updated 4 years ago
- A secure aggregation system for private federated learning☆49May 13, 2024Updated last year
- ☆443Jun 19, 2024Updated last year
- [ICML'23 Oral] HETAL: Efficient Privacy-preserving Transfer Learning with Homomorphic Encryption☆47Mar 29, 2024Updated last year
- Private and Reliable Neural Network Inference (CCS '22)☆22Jul 11, 2023Updated 2 years ago
- ☆16May 22, 2023Updated 2 years ago
- A framework for secure, handy, accurate, and fast transformer inference☆25Aug 29, 2025Updated 6 months ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Dec 24, 2025Updated 2 months ago
- PhantomFHE: A CUDA-Accelerated Homomorphic Encryption Library☆149Jan 1, 2025Updated last year
- ☆21Jun 17, 2022Updated 3 years ago
- SPU (Secure Processing Unit) aims to be a provable, measurable secure computation device, which provides computation ability while keepin…☆316Updated this week
- [ICML2022] ProgFed: Effective, Communication, and Computation Efficient Federated Learning by Progressive Training☆23Oct 17, 2022Updated 3 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆28Apr 15, 2024Updated last year
- ☆30Jan 22, 2023Updated 3 years ago
- Code for Findings of ACL 2021 "Differential Privacy for Text Analytics via Natural Text Sanitization"☆32Mar 15, 2022Updated 3 years ago
- Decision trees training and prediction over encrypted data using Fully Homomorphic Encryption☆29Mar 23, 2023Updated 2 years ago
- Privacy preserving vertical federated learning for tree-based models☆30Nov 11, 2021Updated 4 years ago
- Materials about Privacy-Preserving Machine Learning☆263Feb 2, 2026Updated last month
- Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code (Findings of EACL …☆12Feb 11, 2026Updated 2 weeks ago