edufourfr / reading-in-the-darkView external linksLinks
Implementation of "Reading in the Dark: Classifying Encrypted Digits with Functional Encryption"
☆22Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for reading-in-the-dark
Users that are interested in reading-in-the-dark are comparing it to the libraries listed below
Sorting:
- NN-EMD framework: efficiently training neural networks using encrypted multi-sourced datasets☆14Jun 6, 2021Updated 4 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Oct 1, 2019Updated 6 years ago
- Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets☆41Feb 25, 2023Updated 2 years ago
- A library for running Functional Encryption on tensors☆45Jan 5, 2021Updated 5 years ago
- This is an implementation for paper "A Hybrid Approach to Privacy Preserving Federated Learning" (https://arxiv.org/pdf/1812.03224.pdf)☆24Jun 9, 2020Updated 5 years ago
- This work combines differential privacy and multi-party computation protocol to achieve distributed machine learning.☆26Oct 15, 2020Updated 5 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- ☆14May 17, 2024Updated last year
- Implementation and results for ICTIR2021 paper: Effective and Privacy-preserving Federated Online Learning to Rank☆10Jul 24, 2021Updated 4 years ago
- An implementation of Function-Hiding Inner Product Encryption☆47Mar 4, 2016Updated 9 years ago
- ☆10Oct 18, 2021Updated 4 years ago
- Implementation of the LLL algorithm in C. Also provides a cython wrapper for the C function so that it may be used in python.☆12Apr 26, 2013Updated 12 years ago
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- Efficient Adversarial Attack Strategy Against 3D Object Detection in Autonomous Driving Systems☆38Oct 7, 2025Updated 4 months ago
- Python 3 wrapper for the mcl library☆12Jan 16, 2026Updated last month
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- Secure Inference Resilient Against Malicious Clients☆15May 3, 2022Updated 3 years ago
- ☆11May 17, 2021Updated 4 years ago
- ☆13Sep 12, 2021Updated 4 years ago
- Everything you always wanted to know about ANNS but were afraid to ask 🥰☆11Dec 21, 2024Updated last year
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 5 years ago
- This course introduced me to three cutting-edge technologies for privacy-preserving AI: Federated Learning, Differential Privacy, and Enc…☆11Sep 2, 2019Updated 6 years ago
- Tool for Automating efficient Secure Two-partY computation protocols☆10Nov 10, 2016Updated 9 years ago
- Membership Inference Attack on Federated Learning☆12Jan 14, 2022Updated 4 years ago
- ☆14Dec 8, 2021Updated 4 years ago
- Linear algebra-based Proof of Retrievability protocol for ensuring data integrity☆14Mar 28, 2022Updated 3 years ago
- Parallel Approximate Nearest Neighbor Search☆14Nov 12, 2022Updated 3 years ago
- ☆16Dec 11, 2023Updated 2 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- ☆14Apr 11, 2018Updated 7 years ago
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆12Oct 25, 2019Updated 6 years ago
- Image and text encryption using Shamir's Secret Sharing algorithm☆14Feb 17, 2020Updated 6 years ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆50Jul 2, 2025Updated 7 months ago
- ☆17Feb 7, 2024Updated 2 years ago
- Temporary Discriminator GAN☆14Jul 21, 2020Updated 5 years ago
- ☆16Aug 31, 2021Updated 4 years ago
- Federated Learning in Network Intrusion Detection☆14Feb 22, 2023Updated 2 years ago