ziqi-zhang / TEESlice-artifactLinks
☆41Updated 7 months ago
Alternatives and similar repositories for TEESlice-artifact
Users that are interested in TEESlice-artifact are comparing it to the libraries listed below
Sorting:
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆48Updated last year
- ☆28Updated 2 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Updated 4 years ago
- icml24☆12Updated 8 months ago
- runs several layers of a deep learning model in TrustZone☆91Updated last year
- Privacy-preserving Federated Learning with Trusted Execution Environments☆74Updated 4 months ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆170Updated 2 years ago
- Open-source code and data for ShadowNet(S&P Oakland'23)☆11Updated last year
- ☆21Updated 3 years ago
- Deep Learning with Intel SGX☆23Updated 6 years ago
- ☆40Updated 2 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆88Updated 4 years ago
- ☆19Updated 5 years ago
- ☆14Updated 4 years ago
- ☆28Updated 2 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆201Updated last month
- ☆34Updated 3 years ago
- ☆32Updated 3 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆26Updated 2 years ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆19Updated 5 years ago
- Piranha: A GPU Platform for Secure Computation☆102Updated 2 years ago
- Privacy-preserving Deep Learning based on homomorphic encryption (HE)☆34Updated 4 years ago
- ☆49Updated 4 years ago
- Code release for MPCViT accepted by ICCV 2023☆16Updated 10 months ago
- [arXiv'21] Additively Symmetric Homomorphic Encryption for Cross-Silo Federated Learning☆22Updated 6 months ago
- ☆16Updated 4 years ago
- This repo summarizes papers for efficient PPML across protocol, model, and system levels.☆50Updated last month
- ☆89Updated 5 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆29Updated 4 years ago
- Secure Inference Resilient Against Malicious Clients☆15Updated 3 years ago