As machine learning as a service continues gaining popularity, concerns ...
Every major technical invention resurfaces the dual-use dilemma – the ne...
Recent years have witnessed success in AIGC (AI Generated Content). Peop...
Machine Learning as a Service (MLaaS) is an increasingly popular design ...
Deep image classification models trained on large amounts of web-scraped...
Deepfakes refer to content synthesized using deep generators, which, whe...
Fully Homomorphic Encryption (FHE) permits the evaluation of an arbitrar...
Private computation, which includes techniques like multi-party computat...
In a Private section intersection (PSI) protocol, Alice and Bob compute ...
As the issues of privacy and trust are receiving increasing attention wi...
We present an approach to quantify and compare the privacy-accuracy trad...
Equality operators are an essential building block in tasks over secure
...
Differentially private training algorithms provide protection against on...
Searchable Symmetric Encryption (SSE) schemes allow a client to perform
...
Deep Neural Network (DNN) watermarking is a method for provenance
verifi...
An increasingly popular method for computing aggregate statistics while
...
Encryption provides a method to protect data outsourced to a DBMS provid...
Outlier detection plays a significant role in various real world applica...
Differential privacy allows bounding the influence that training data re...
Searchable Symmetric Encryption (SSE) allows a data owner to securely
ou...
Training machine learning models on privacy-sensitive data has become a
...
Recent Searchable Symmetric Encryption (SSE) schemes enable secure searc...
A major algorithmic challenge in designing applications intended for sec...
Data confidentiality is an important requirement for clients when outsou...
Releasing data in the form of trained neural networks with differential
...
In Machine Learning as a Service, a provider trains a deep neural networ...
Training deep neural networks (DNN) is expensive in terms of computation...
Decision trees are a powerful prediction model with many applications in...
We consider the problem of securely computing the kth-ranked element in ...
Obtaining the state of the art performance of deep learning models impos...
Text mining and information retrieval techniques have been developed to
...
Order-preserving encryption allows encrypting data, while still enabling...