yuanmu97 / secure-transformer-inference
Secure Transformer Inference is a protocol for serving Transformer-based models securely.
☆90Updated 9 months ago
Alternatives and similar repositories for secure-transformer-inference:
Users that are interested in secure-transformer-inference are comparing it to the libraries listed below
- [INFOCOM 2024 Top 1 Popular Article] Agglomerative Federated Learning: Empowering Larger Model Training via End-Edge-Cloud Collaboration☆59Updated last month
- HeFlwr: Federated Learning for Heterogeneous Devices☆94Updated 2 months ago
- [TMC 2024 Top 15 Popular Article] FedCache: A Knowledge Cache-driven Federated Learning Architecture for Personalized Edge Intelligence☆80Updated last month
- ☆73Updated 3 months ago
- Official Implementation of "Accel-GNN: High-Performance GPU Accelerator Design for Graph Neural Networks"☆49Updated last year
- ☆77Updated last month
- ☆17Updated last year
- Practical Detection of Trojan Neural Networks☆119Updated 4 years ago
- ☆97Updated 3 years ago
- ☆17Updated 3 months ago
- GLT has presented the first attempt to accelerate GNN inference. Though promising, GLT encounters robustness and generalization issues wh…☆28Updated 10 months ago
- ☆19Updated 3 months ago
- A framework for implementing federated learning☆32Updated 3 years ago
- ☆36Updated last year
- A collection of papers related to knowledge fusion☆54Updated 4 months ago
- This project help you understand the concepts of histogram equalization and histogram specification in image processing learning from a p…☆9Updated last year
- ☆19Updated 7 months ago
- This data set contains flow-based network security data sets extracted from satellite networks and terrestrial networks. We named the dat…☆22Updated 4 years ago
- GAL-DAWN: An Novel High performance computing Library of Graph Algorithms based on DAWN, CUDA/C++☆86Updated 6 months ago
- A comprehensive collection of resources focused on addressing and understanding hallucination phenomena in MLLMs.☆35Updated 9 months ago
- Kevin, I., et al. "Federated Learning with Clustering-Based Participant Selection for IoT Applications." 2022 IEEE International Conferen…☆11Updated 6 months ago
- This is the public code repository for the paper 'Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage …☆9Updated last month
- A demo project to demonstrate how DES encryption/decryption works.☆13Updated 2 years ago
- This respiratory is the source code of the paper "The Design and Implementation of a High-performance Portfolio Optimization Platform"☆25Updated 4 years ago
- Code for NeurIPS24 paper <Entity Alignment with Noisy Annotations from Large Language Models>☆49Updated last month
- ☆11Updated 4 months ago
- A Large-scale Hierarchical Dynamic Financial Knowledge Base☆47Updated 7 months ago
- ☆51Updated last year
- ☆35Updated last month
- Code for WWW'22 "Who to Watch Next: Two-side Interactive Networks for Live Broadcast Recommendation"☆30Updated last year