Picture for Runhua Xu

Runhua Xu

Privacy-Preserving Machine Learning: Methods, Challenges and Directions

Add code
Aug 10, 2021
Figure 1 for Privacy-Preserving Machine Learning: Methods, Challenges and Directions
Figure 2 for Privacy-Preserving Machine Learning: Methods, Challenges and Directions
Figure 3 for Privacy-Preserving Machine Learning: Methods, Challenges and Directions
Figure 4 for Privacy-Preserving Machine Learning: Methods, Challenges and Directions
Viaarxiv icon

FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data

Add code
Mar 05, 2021
Figure 1 for FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Figure 2 for FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Figure 3 for FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Figure 4 for FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Viaarxiv icon

NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets

Add code
Dec 18, 2020
Figure 1 for NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets
Figure 2 for NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets
Figure 3 for NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets
Figure 4 for NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets
Viaarxiv icon

HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning

Add code
Dec 12, 2019
Figure 1 for HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning
Figure 2 for HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning
Figure 3 for HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning
Figure 4 for HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning
Viaarxiv icon

CryptoNN: Training Neural Networks over Encrypted Data

Add code
Apr 26, 2019
Figure 1 for CryptoNN: Training Neural Networks over Encrypted Data
Figure 2 for CryptoNN: Training Neural Networks over Encrypted Data
Figure 3 for CryptoNN: Training Neural Networks over Encrypted Data
Figure 4 for CryptoNN: Training Neural Networks over Encrypted Data
Viaarxiv icon