yuanmu97 / secure-transformer-inference
Secure Transformer Inference is a protocol for serving Transformer-based models securely.
☆92Updated last year
Alternatives and similar repositories for secure-transformer-inference
Users that are interested in secure-transformer-inference are comparing it to the libraries listed below
Sorting:
- ☆17Updated last year
- ☆78Updated 4 months ago
- [INFOCOM 2024 Top 1 Popular Article] Agglomerative Federated Learning: Empowering Larger Model Training via End-Edge-Cloud Collaboration☆67Updated 4 months ago
- Practical Detection of Trojan Neural Networks☆119Updated 4 years ago
- ☆73Updated 3 months ago
- ☆16Updated 6 months ago
- ☆119Updated last week
- ☆29Updated 2 months ago
- [TMC 2024 Top 15 Popular Article] FedCache: A Knowledge Cache-driven Federated Learning Architecture for Personalized Edge Intelligence☆85Updated 2 weeks ago
- This data set contains flow-based network security data sets extracted from satellite networks and terrestrial networks. We named the dat…☆24Updated 4 years ago
- A framework for implementing federated learning☆31Updated 4 years ago
- 通过撤销数据对联邦学习模型的训练更新,解决了联邦学习中的数据隐私安全问题。☆25Updated 2 months ago
- Official Implementation of "Accel-GNN: High-Performance GPU Accelerator Design for Graph Neural Networks"☆50Updated last month
- ☆96Updated 3 years ago
- GLT has presented the first attempt to accelerate GNN inference. Though promising, GLT encounters robustness and generalization issues wh…☆28Updated last year
- A benchmark for logging statement generation.☆21Updated 6 months ago
- A curated list of resources around BitVM☆28Updated last year
- ☆36Updated last year
- 2d game, a birthday present for my girl friend, the game prototype is Magic Tower☆26Updated 5 months ago
- A Large-scale Hierarchical Dynamic Financial Knowledge Base☆47Updated 10 months ago
- ☆11Updated 7 months ago
- Multi-Attentional Deepfake Detection☆20Updated 6 months ago
- use sklearn to detect two types of network attacks☆33Updated 5 years ago
- This project help you understand the concepts of histogram equalization and histogram specification in image processing learning from a p…☆9Updated last year
- This is the public code repository for the paper 'Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage …☆9Updated 4 months ago
- Kevin, I., et al. "Federated Learning with Clustering-Based Participant Selection for IoT Applications." 2022 IEEE International Conferen…☆11Updated 9 months ago
- Crack Vigenere Ciphertext using statistic method (Index of Coincidence and Chi-square)☆18Updated last year
- ☆19Updated 10 months ago
- NLP自学仓库☆24Updated 10 months ago
- alsap_frontend☆23Updated 3 months ago