ziqi-zhang / TEESlice-artifactLinks
☆45Updated 8 months ago
Alternatives and similar repositories for TEESlice-artifact
Users that are interested in TEESlice-artifact are comparing it to the libraries listed below
Sorting:
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆50Updated last year
- ☆29Updated 2 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Updated 4 years ago
- icml24☆14Updated 10 months ago
- runs several layers of a deep learning model in TrustZone☆93Updated last year
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆171Updated 2 years ago
- Privacy-preserving Federated Learning with Trusted Execution Environments☆74Updated 5 months ago
- Open-source code and data for ShadowNet(S&P Oakland'23)☆11Updated last year
- ☆21Updated 3 years ago
- ☆40Updated 2 years ago
- ☆34Updated 3 years ago
- ☆32Updated 3 years ago
- ☆29Updated 2 years ago
- Deep Learning with Intel SGX☆23Updated 6 years ago
- ☆28Updated 9 months ago
- ☆23Updated last year
- ☆14Updated 4 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆88Updated 4 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆207Updated 2 months ago
- ☆19Updated 5 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆29Updated 4 years ago
- Secure Inference Resilient Against Malicious Clients☆15Updated 3 years ago
- Piranha: A GPU Platform for Secure Computation☆103Updated 2 years ago
- Privacy-Preserving, Accurate and Efficient Inference for Transformers☆33Updated last year
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆20Updated 5 years ago
- Implementation of the Reusable Enclaves paper☆14Updated 2 years ago
- ☆49Updated 5 years ago
- A Cryptographic Inference Service for Neural Networks☆130Updated last year
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Updated 2 months ago
- Secure Aggregation for Federated Learning with Malicious Actors☆28Updated 3 years ago