ziqi-zhang / TAOISMLinks
TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models
☆45Updated last year
Alternatives and similar repositories for TAOISM
Users that are interested in TAOISM are comparing it to the libraries listed below
Sorting:
- ☆39Updated 6 months ago
- ☆27Updated last year
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Updated 4 years ago
- ☆28Updated 2 years ago
- icml24☆11Updated 7 months ago
- ☆38Updated 2 years ago
- ☆34Updated 2 years ago
- runs several layers of a deep learning model in TrustZone☆91Updated last year
- Privacy-preserving Federated Learning with Trusted Execution Environments☆72Updated 2 months ago
- ☆19Updated 3 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆166Updated 2 years ago
- ☆32Updated 3 years ago
- ☆14Updated 3 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆181Updated last month
- Deep Learning with Intel SGX☆23Updated 6 years ago
- ☆25Updated 7 months ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆28Updated 4 years ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated 2 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆86Updated 4 years ago
- Implementation of the Reusable Enclaves paper☆14Updated 2 years ago
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆15Updated 2 years ago
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆55Updated last year
- ☆19Updated 5 years ago
- ☆23Updated last year
- Trusted I/O Paths for SGX Enclaves☆18Updated 5 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆119Updated 5 months ago
- Piranha: A GPU Platform for Secure Computation☆100Updated 2 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆13Updated 10 months ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Updated last year
- ☆20Updated 9 months ago