LIJUNYI95 / SecureML_RefLinks
☆18Updated 3 years ago
Alternatives and similar repositories for SecureML_Ref
Users that are interested in SecureML_Ref are comparing it to the libraries listed below
Sorting:
- ☆108Updated 3 years ago
 - ☆67Updated 7 years ago
 - Implementation of protocols in SecureNN.☆131Updated 3 years ago
 - A crypto-assisted framework for protecting the privacy of models and queries in inference.☆19Updated 4 years ago
 - Fast Privacy-Preserving Machine Learning on the GPU☆88Updated 4 years ago
 - A Cryptographic Inference Service for Neural Networks☆131Updated last year
 - Homomorphic matrix computation☆43Updated 6 years ago
 - Implementation of protocols in Falcon☆95Updated last year
 - Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 7 years ago
 - Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Updated 6 years ago
 - Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆19Updated 5 years ago
 - Piranha: A GPU Platform for Secure Computation☆100Updated 2 years ago
 - Secure Logistic Regression based on Homomorphic Encryption☆43Updated 6 years ago
 - Privacy Preserving Convolutional Neural Network using Homomorphic Encryption for secure inference☆48Updated 4 years ago
 - Materials about Privacy-Preserving Machine Learning☆258Updated last month
 - ☆37Updated 11 months ago
 - Privacy-preserving Deep Learning based on homomorphic encryption (HE)☆34Updated 3 years ago
 - A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
 - The repo of "BumbleBee: Secure Two-party Inference Framework for Large Transformers" (NDSS 2025)☆48Updated 9 months ago
 - ☆37Updated 2 years ago
 - Public source code for Optimized Privacy-Preserving CNN Inference with Fully Homomorphic Encryption☆42Updated 2 years ago
 - NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Updated 2 weeks ago
 - Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆101Updated 2 years ago
 - ☆27Updated 6 years ago
 - Experimental Code for Private Decision Tree Evaluation☆15Updated 2 years ago
 - C++ OT extension implementation☆128Updated 4 years ago
 - ☆20Updated 7 years ago
 - Secure Aggregation for FL☆35Updated last year
 - GPU/CUDA implementation of Leveled BFV/CKKS/BGV scheme.☆39Updated last month
 - Benchmarks for various multi-party computation frameworks☆18Updated last year