qianlou / HEMETLinks
☆12Updated 4 years ago
Alternatives and similar repositories for HEMET
Users that are interested in HEMET are comparing it to the libraries listed below
Sorting:
- ☆106Updated 3 years ago
- ☆31Updated 4 years ago
- Privacy-preserving Deep Learning based on homomorphic encryption (HE)☆34Updated 3 years ago
- ☆67Updated 6 years ago
- A Cryptographic Inference Service for Neural Networks☆130Updated last year
- Fast Privacy-Preserving Machine Learning on the GPU☆86Updated 4 years ago
- Piranha: A GPU Platform for Secure Computation☆98Updated 2 years ago
- Privacy Preserving Convolutional Neural Network using Homomorphic Encryption for secure inference☆48Updated 4 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 6 years ago
- Implementation of protocols in SecureNN.☆131Updated 2 years ago
- Implementation of protocols in Falcon☆95Updated last year
- ☆19Updated 3 years ago
- Privacy -preserving Neural Networks☆78Updated 6 years ago
- Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs☆11Updated 2 years ago
- A crypto-assisted framework for protecting the privacy of models and queries in inference.☆19Updated 3 years ago
- Secure Aggregation for FL☆35Updated last year
- ☆31Updated 3 years ago
- ☆37Updated 9 months ago
- Implementation of deep ResNet model on CKKS scheme in Microsoft SEAL library using multiplexed parallel convolution☆89Updated 3 years ago
- Homomorphic matrix computation☆43Updated 6 years ago
- ☆19Updated 6 years ago
- Materials about Privacy-Preserving Machine Learning☆254Updated 2 weeks ago
- Intel Paillier Cryptosystem Library is an open-source library which provides accelerated performance of a partial homomorphic encryption …☆56Updated 2 months ago
- The repo of "BumbleBee: Secure Two-party Inference Framework for Large Transformers" (NDSS 2025)☆44Updated 6 months ago
- ☆36Updated last year
- ☆88Updated 5 years ago
- Secure Logistic Regression based on Homomorphic Encryption☆44Updated 6 years ago
- ☆27Updated 6 years ago
- ☆57Updated 3 years ago