nusdbsystem / pivotLinks
Privacy preserving vertical federated learning for tree-based models
☆30Updated 4 years ago
Alternatives and similar repositories for pivot
Users that are interested in pivot are comparing it to the libraries listed below
Sorting:
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Updated 6 years ago
- Materials about Privacy-Preserving Machine Learning☆260Updated 2 months ago
- Implementation of protocols in SecureNN.☆131Updated 3 years ago
- Repository for collection of research papers on multi-party learning.☆34Updated 2 years ago
- Privacy-preserving Deep Learning based on homomorphic encryption (HE)☆35Updated 4 years ago
- Secure Aggregation for FL☆36Updated 2 years ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆113Updated 2 years ago
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- Fast Privacy-Preserving Machine Learning on the GPU☆88Updated 4 years ago
- A secure aggregation system for private federated learning☆45Updated last year
- ☆38Updated last year
- Secure Aggregation for Federated Learning with Malicious Actors☆26Updated 3 years ago
- ☆90Updated 5 years ago
- ☆109Updated 3 years ago
- Intel Paillier Cryptosystem Library is an open-source library which provides accelerated performance of a partial homomorphic encryption …☆56Updated 5 months ago
- Implementation of protocols in Falcon☆95Updated last year
- A mathematical and code introduction to the BFV Homomorphic Encryption scheme.☆40Updated 3 years ago
- ☆127Updated 3 months ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago
- Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing☆51Updated 4 years ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Updated last month
- ☆440Updated last year
- ☆31Updated 2 years ago
- Piranha: A GPU Platform for Secure Computation☆103Updated 2 years ago
- Private Decision Tree Evaluation protocols☆11Updated 5 years ago
- ☆67Updated 7 years ago
- Privacy Preserving Convolutional Neural Network using Homomorphic Encryption for secure inference☆49Updated 4 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 3 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆12Updated last year
- A Three Party MPC framework for Machine learning and Databases☆211Updated 8 months ago