Picture for Wenjie Xiong

Wenjie Xiong

Information Flow Control in Machine Learning through Modular Model Architecture

Jun 05, 2023
Figure 1 for Information Flow Control in Machine Learning through Modular Model Architecture
Figure 2 for Information Flow Control in Machine Learning through Modular Model Architecture
Figure 3 for Information Flow Control in Machine Learning through Modular Model Architecture
Figure 4 for Information Flow Control in Machine Learning through Modular Model Architecture
Viaarxiv icon

GPU-based Private Information Retrieval for On-Device Machine Learning Inference

Add code
Jan 27, 2023
Figure 1 for GPU-based Private Information Retrieval for On-Device Machine Learning Inference
Figure 2 for GPU-based Private Information Retrieval for On-Device Machine Learning Inference
Figure 3 for GPU-based Private Information Retrieval for On-Device Machine Learning Inference
Figure 4 for GPU-based Private Information Retrieval for On-Device Machine Learning Inference
Viaarxiv icon

Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems

Dec 12, 2022
Figure 1 for Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems
Figure 2 for Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems
Figure 3 for Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems
Figure 4 for Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems
Viaarxiv icon

MPCViT: Searching for MPC-friendly Vision Transformer with Heterogeneous Attention

Add code
Nov 25, 2022
Figure 1 for MPCViT: Searching for MPC-friendly Vision Transformer with Heterogeneous Attention
Figure 2 for MPCViT: Searching for MPC-friendly Vision Transformer with Heterogeneous Attention
Figure 3 for MPCViT: Searching for MPC-friendly Vision Transformer with Heterogeneous Attention
Figure 4 for MPCViT: Searching for MPC-friendly Vision Transformer with Heterogeneous Attention
Viaarxiv icon

Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis

Add code
Sep 12, 2022
Figure 1 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 2 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 3 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 4 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Viaarxiv icon