Alert button
Picture for Yongqin Wang

Yongqin Wang

Alert button

MPC-Pipe: an Efficient Pipeline Scheme for Secure Multi-party Machine Learning Inference

Add code
Bookmark button
Alert button
Sep 27, 2022
Yongqin Wang, Rachit Rajat, Murali Annavaram

Figure 1 for MPC-Pipe: an Efficient Pipeline Scheme for Secure Multi-party Machine Learning Inference
Figure 2 for MPC-Pipe: an Efficient Pipeline Scheme for Secure Multi-party Machine Learning Inference
Figure 3 for MPC-Pipe: an Efficient Pipeline Scheme for Secure Multi-party Machine Learning Inference
Figure 4 for MPC-Pipe: an Efficient Pipeline Scheme for Secure Multi-party Machine Learning Inference
Viaarxiv icon

DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware

Add code
Bookmark button
Alert button
Jun 30, 2022
Hanieh Hashemi, Yongqin Wang, Murali Annavaram

Figure 1 for DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware
Figure 2 for DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware
Figure 3 for DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware
Figure 4 for DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware
Viaarxiv icon

Byzantine-Robust and Privacy-Preserving Framework for FedML

Add code
Bookmark button
Alert button
May 05, 2021
Hanieh Hashemi, Yongqin Wang, Chuan Guo, Murali Annavaram

Figure 1 for Byzantine-Robust and Privacy-Preserving Framework for FedML
Figure 2 for Byzantine-Robust and Privacy-Preserving Framework for FedML
Figure 3 for Byzantine-Robust and Privacy-Preserving Framework for FedML
Viaarxiv icon

Privacy and Integrity Preserving Training Using Trusted Hardware

Add code
Bookmark button
Alert button
May 01, 2021
Hanieh Hashemi, Yongqin Wang, Murali Annavaram

Figure 1 for Privacy and Integrity Preserving Training Using Trusted Hardware
Figure 2 for Privacy and Integrity Preserving Training Using Trusted Hardware
Figure 3 for Privacy and Integrity Preserving Training Using Trusted Hardware
Figure 4 for Privacy and Integrity Preserving Training Using Trusted Hardware
Viaarxiv icon

Privacy-Preserving Inference in Machine Learning Services Using Trusted Execution Environments

Add code
Bookmark button
Alert button
Dec 07, 2019
Krishna Giri Narra, Zhifeng Lin, Yongqin Wang, Keshav Balasubramaniam, Murali Annavaram

Figure 1 for Privacy-Preserving Inference in Machine Learning Services Using Trusted Execution Environments
Figure 2 for Privacy-Preserving Inference in Machine Learning Services Using Trusted Execution Environments
Figure 3 for Privacy-Preserving Inference in Machine Learning Services Using Trusted Execution Environments
Figure 4 for Privacy-Preserving Inference in Machine Learning Services Using Trusted Execution Environments
Viaarxiv icon