RasoulAM / private-decision-tree-evaluationLinks
Experimental Code for Private Decision Tree Evaluation
☆14Updated last year
Alternatives and similar repositories for private-decision-tree-evaluation
Users that are interested in private-decision-tree-evaluation are comparing it to the libraries listed below
Sorting:
- ☆31Updated 3 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- ☆67Updated 6 years ago
- Privacy-Preserving, Accurate and Efficient Inference for Transformers☆27Updated last year
- ☆106Updated 3 years ago
- Privacy Preserving Convolutional Neural Network using Homomorphic Encryption for secure inference☆48Updated 4 years ago
- Implementation of deep ResNet model on CKKS scheme in Microsoft SEAL library using multiplexed parallel convolution☆88Updated 3 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆86Updated 4 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 6 years ago
- Homomorphic matrix computation☆43Updated 6 years ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆19Updated 3 weeks ago
- Cryptographically Secure Aggregation for Federated Learning☆11Updated 2 years ago
- The repo of "BumbleBee: Secure Two-party Inference Framework for Large Transformers" (NDSS 2025)☆44Updated 6 months ago
- ☆14Updated 3 years ago
- Implementation of protocols in Falcon☆95Updated last year
- Privacy-Preserving Convolutional Neural Networks using Homomorphic Encryption☆80Updated last year
- Public source code for Optimized Privacy-Preserving CNN Inference with Fully Homomorphic Encryption☆39Updated 2 years ago
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆20Updated 4 years ago
- Materials about Privacy-Preserving Machine Learning☆254Updated last week
- Privacy-preserving Deep Learning based on homomorphic encryption (HE)☆34Updated 3 years ago
- A secure aggregation system for private federated learning☆41Updated last year
- Private Inference on Transformer☆27Updated 2 years ago
- ☆10Updated 3 years ago
- ☆36Updated last year
- A mathematical and code introduction to the BFV Homomorphic Encryption scheme.☆39Updated 2 years ago
- A crypto-assisted framework for protecting the privacy of models and queries in inference.☆19Updated 3 years ago
- Source code for the paper "Encrypted Image Classification with Low Memory Footprint using Fully Homomorphic Encryption"☆58Updated 5 months ago
- Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing☆51Updated 4 years ago
- ☆37Updated 9 months ago
- Piranha: A GPU Platform for Secure Computation☆98Updated 2 years ago