qianlou / SHELinks
☆31Updated 4 years ago
Alternatives and similar repositories for SHE
Users that are interested in SHE are comparing it to the libraries listed below
Sorting:
- ☆12Updated 4 years ago
- Privacy-preserving Deep Learning based on homomorphic encryption (HE)☆34Updated 3 years ago
- Implementation of deep ResNet model on CKKS scheme in Microsoft SEAL library using multiplexed parallel convolution☆90Updated 3 years ago
- A crypto-assisted framework for protecting the privacy of models and queries in inference.☆19Updated 3 years ago
- Privacy Preserving Convolutional Neural Network using Homomorphic Encryption for secure inference☆48Updated 4 years ago
- CryptoNets using Python and ctypes. This repository is part of the final project of Neural Networks at Sapienza University of Rome.☆23Updated 5 years ago
- ☆108Updated 3 years ago
- Privacy-Preserving Convolutional Neural Networks using Homomorphic Encryption☆81Updated last year
- ☆33Updated 3 years ago
- Source code for the paper "Encrypted Image Classification with Low Memory Footprint using Fully Homomorphic Encryption"☆61Updated 6 months ago
- Public source code for Optimized Privacy-Preserving CNN Inference with Fully Homomorphic Encryption☆41Updated 2 years ago
- This is code for homomorphic encryption scheme "a Full RNS variant of HEAAN"☆59Updated 6 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆86Updated 4 years ago
- code repo for paper accepted in ICML 2023☆12Updated last year
- Piranha: A GPU Platform for Secure Computation☆99Updated 2 years ago
- Crypto-Convolutional Neural Network library written on top of SEAL 2.3.1☆14Updated 5 years ago
- ☆15Updated 3 years ago
- ☆67Updated 7 years ago
- Homomorphic matrix computation☆43Updated 6 years ago
- nGraph-HE: Deep learning with Homomorphic Encryption (HE) through Intel nGraph☆174Updated 2 years ago
- ☆20Updated 6 years ago
- OpenFHE-Based Examples of Logistic Regression Training using Nesterov Accelerated Gradient Descent☆29Updated 4 months ago
- A mathematical and code introduction to the BFV Homomorphic Encryption scheme.☆39Updated 2 years ago
- Privacy-Preserving, Accurate and Efficient Inference for Transformers☆28Updated last year
- Experimental Code for Private Decision Tree Evaluation☆15Updated 2 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 7 years ago
- Secure Inference Resilient Against Malicious Clients☆15Updated 3 years ago
- A Cryptographic Inference Service for Neural Networks☆131Updated last year
- ☆11Updated 3 years ago
- Privacy -preserving Neural Networks☆79Updated 6 years ago