goten-team / GotenLinks
Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction
☆34Updated 4 years ago
Alternatives and similar repositories for Goten
Users that are interested in Goten are comparing it to the libraries listed below
Sorting:
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆170Updated 2 years ago
- ☆41Updated 7 months ago
- Fast Privacy-Preserving Machine Learning on the GPU☆88Updated 4 years ago
- Deep Learning with Intel SGX☆23Updated 6 years ago
- A Cryptographic Inference Service for Neural Networks☆130Updated last year
- Piranha: A GPU Platform for Secure Computation☆102Updated 2 years ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆48Updated last year
- A crypto-assisted framework for protecting the privacy of models and queries in inference.☆19Updated 4 years ago
- ☆28Updated 2 years ago
- Privacy-preserving Deep Learning based on homomorphic encryption (HE)☆34Updated 4 years ago
- Secure Inference Resilient Against Malicious Clients☆15Updated 3 years ago
- runs several layers of a deep learning model in TrustZone☆91Updated last year
- Privacy-Preserving, Accurate and Efficient Inference for Transformers☆32Updated last year
- Homomorphic matrix computation☆43Updated 6 years ago
- Privacy-preserving Federated Learning with Trusted Execution Environments☆74Updated 4 months ago
- ☆109Updated 3 years ago
- ☆67Updated 7 years ago
- ☆19Updated 5 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆81Updated 2 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆26Updated 2 years ago
- Implementation of deep ResNet model on CKKS scheme in Microsoft SEAL library using multiplexed parallel convolution☆98Updated 3 years ago
- ☆12Updated 4 years ago
- Secure Aggregation for FL☆35Updated last year
- Privacy -preserving Neural Networks☆79Updated 6 years ago
- ☆15Updated 3 years ago
- ☆32Updated 4 years ago
- ☆104Updated last year
- Homomorphic Logistic Regression on Encrypted Data☆50Updated 6 years ago
- ☆18Updated 3 years ago
- Implementation of protocols in SecureNN.☆131Updated 3 years ago