nusdbsystem / pivotLinks
Privacy preserving vertical federated learning for tree-based models
☆29Updated 3 years ago
Alternatives and similar repositories for pivot
Users that are interested in pivot are comparing it to the libraries listed below
Sorting:
- Secure Aggregation for FL☆35Updated last year
- Materials about Privacy-Preserving Machine Learning☆256Updated 3 weeks ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Updated 6 years ago
- Privacy-preserving Deep Learning based on homomorphic encryption (HE)☆34Updated 3 years ago
- Implementation of protocols in SecureNN.☆131Updated 3 years ago
- A secure aggregation system for private federated learning☆42Updated last year
- Repository for collection of research papers on multi-party learning.☆33Updated 2 years ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆113Updated 2 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆26Updated 2 years ago
- ☆37Updated 11 months ago
- Privacy -preserving Neural Networks☆79Updated 6 years ago
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- ☆88Updated 5 years ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Updated 2 months ago
- Fast Privacy-Preserving Machine Learning on the GPU☆87Updated 4 years ago
- Privacy Preserving Convolutional Neural Network using Homomorphic Encryption for secure inference☆48Updated 4 years ago
- Implementation of protocols in Falcon☆95Updated last year
- A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
- ☆30Updated 2 years ago
- ☆108Updated 3 years ago
- Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing☆51Updated 4 years ago
- ☆432Updated last year
- A Cryptographic Inference Service for Neural Networks☆131Updated last year
- ☆67Updated 7 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆12Updated 9 months ago
- Piranha: A GPU Platform for Secure Computation☆100Updated 2 years ago
- ☆124Updated last month
- Privacy-Preserving Convolutional Neural Networks using Homomorphic Encryption☆81Updated last year
- Private Decision Tree Evaluation protocols☆11Updated 5 years ago
- ☆58Updated 3 years ago