Picture for James Joshi

James Joshi

Privacy-Preserving Machine Learning: Methods, Challenges and Directions

Add code
Aug 10, 2021
Figure 1 for Privacy-Preserving Machine Learning: Methods, Challenges and Directions
Figure 2 for Privacy-Preserving Machine Learning: Methods, Challenges and Directions
Figure 3 for Privacy-Preserving Machine Learning: Methods, Challenges and Directions
Figure 4 for Privacy-Preserving Machine Learning: Methods, Challenges and Directions
Viaarxiv icon

Adaptive ABAC Policy Learning: A Reinforcement Learning Approach

Add code
May 18, 2021
Figure 1 for Adaptive ABAC Policy Learning: A Reinforcement Learning Approach
Figure 2 for Adaptive ABAC Policy Learning: A Reinforcement Learning Approach
Figure 3 for Adaptive ABAC Policy Learning: A Reinforcement Learning Approach
Figure 4 for Adaptive ABAC Policy Learning: A Reinforcement Learning Approach
Viaarxiv icon

FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data

Add code
Mar 05, 2021
Figure 1 for FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Figure 2 for FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Figure 3 for FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Figure 4 for FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Viaarxiv icon

NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets

Add code
Dec 18, 2020
Figure 1 for NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets
Figure 2 for NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets
Figure 3 for NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets
Figure 4 for NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets
Viaarxiv icon

An Automatic Attribute Based Access Control Policy Extraction from Access Logs

Add code
Mar 17, 2020
Figure 1 for An Automatic Attribute Based Access Control Policy Extraction from Access Logs
Figure 2 for An Automatic Attribute Based Access Control Policy Extraction from Access Logs
Figure 3 for An Automatic Attribute Based Access Control Policy Extraction from Access Logs
Figure 4 for An Automatic Attribute Based Access Control Policy Extraction from Access Logs
Viaarxiv icon