Implementation of "Reading in the Dark: Classifying Encrypted Digits with Functional Encryption"
☆22Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for reading-in-the-dark
Users that are interested in reading-in-the-dark are comparing it to the libraries listed below
Sorting:
- Collateral Learning - Functional Encryption and Adversarial Training on partially encrypted networks☆77Jul 25, 2024Updated last year
- NN-EMD framework: efficiently training neural networks using encrypted multi-sourced datasets☆14Jun 6, 2021Updated 4 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Oct 1, 2019Updated 6 years ago
- Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets☆41Feb 25, 2023Updated 3 years ago
- A library for running Functional Encryption on tensors☆45Jan 5, 2021Updated 5 years ago
- This work combines differential privacy and multi-party computation protocol to achieve distributed machine learning.☆26Oct 15, 2020Updated 5 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- Attacks against proposed image encryption schemes☆10Apr 27, 2020Updated 5 years ago
- ☆14May 17, 2024Updated last year
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- Secure Inference Resilient Against Malicious Clients☆14May 3, 2022Updated 3 years ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- An implementation of Function-Hiding Inner Product Encryption☆47Mar 4, 2016Updated 10 years ago
- ☆11May 17, 2021Updated 4 years ago
- Steganography tools for JPEG images☆10Jul 30, 2013Updated 12 years ago
- Everything you always wanted to know about ANNS but were afraid to ask 🥰☆11Dec 21, 2024Updated last year
- Implementation of the LLL algorithm in C. Also provides a cython wrapper for the C function so that it may be used in python.☆12Apr 26, 2013Updated 12 years ago
- ☆13Sep 12, 2021Updated 4 years ago
- Efficient Adversarial Attack Strategy Against 3D Object Detection in Autonomous Driving Systems☆38Oct 7, 2025Updated 5 months ago
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 6 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- Linear algebra-based Proof of Retrievability protocol for ensuring data integrity☆14Mar 28, 2022Updated 3 years ago
- ☆16Dec 11, 2023Updated 2 years ago
- Tool for Automating efficient Secure Two-partY computation protocols☆10Nov 10, 2016Updated 9 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆12Oct 25, 2019Updated 6 years ago
- Parallel Approximate Nearest Neighbor Search☆14Nov 12, 2022Updated 3 years ago
- [TDSC 2025] Toward Robust and Accurate Adversarial Camouflage Generation against Vehicle Detectors☆14Aug 12, 2025Updated 6 months ago
- ☆14Dec 8, 2021Updated 4 years ago
- Membership Inference Attack on Federated Learning☆12Jan 14, 2022Updated 4 years ago
- A high-performance tool for Zcash blockchain science and exploration☆10Jul 5, 2019Updated 6 years ago
- Image and text encryption using Shamir's Secret Sharing algorithm☆14Feb 17, 2020Updated 6 years ago
- This course introduced me to three cutting-edge technologies for privacy-preserving AI: Federated Learning, Differential Privacy, and Enc…☆11Sep 2, 2019Updated 6 years ago
- 抓去特定某一条微博的评论☆12Sep 22, 2017Updated 8 years ago
- Code for the DP cross-silo federated learning paper☆11Jul 10, 2020Updated 5 years ago
- Federated Learning in Network Intrusion Detection☆14Feb 22, 2023Updated 3 years ago
- Multi-input functional encryption☆12Feb 8, 2018Updated 8 years ago
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated 2 years ago