Picture for Wenjing Fang

Wenjing Fang

Ditto: Quantization-aware Secure Inference of Transformers upon MPC

Add code
May 09, 2024
Figure 1 for Ditto: Quantization-aware Secure Inference of Transformers upon MPC
Figure 2 for Ditto: Quantization-aware Secure Inference of Transformers upon MPC
Figure 3 for Ditto: Quantization-aware Secure Inference of Transformers upon MPC
Figure 4 for Ditto: Quantization-aware Secure Inference of Transformers upon MPC
Viaarxiv icon

LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors

Add code
Aug 26, 2023
Figure 1 for LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
Figure 2 for LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
Figure 3 for LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
Figure 4 for LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
Viaarxiv icon

Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy

Add code
Aug 18, 2022
Figure 1 for Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy
Figure 2 for Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy
Figure 3 for Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy
Figure 4 for Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy
Viaarxiv icon

When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control

Add code
Aug 20, 2020
Figure 1 for When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control
Figure 2 for When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control
Figure 3 for When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control
Figure 4 for When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control
Viaarxiv icon

A Hybrid-Domain Framework for Secure Gradient Tree Boosting

Add code
May 18, 2020
Figure 1 for A Hybrid-Domain Framework for Secure Gradient Tree Boosting
Figure 2 for A Hybrid-Domain Framework for Secure Gradient Tree Boosting
Figure 3 for A Hybrid-Domain Framework for Secure Gradient Tree Boosting
Figure 4 for A Hybrid-Domain Framework for Secure Gradient Tree Boosting
Viaarxiv icon

Secret Sharing based Secure Regressions with Applications

Add code
Apr 10, 2020
Figure 1 for Secret Sharing based Secure Regressions with Applications
Figure 2 for Secret Sharing based Secure Regressions with Applications
Figure 3 for Secret Sharing based Secure Regressions with Applications
Figure 4 for Secret Sharing based Secure Regressions with Applications
Viaarxiv icon

Unpack Local Model Interpretation for GBDT

Add code
Apr 03, 2020
Figure 1 for Unpack Local Model Interpretation for GBDT
Figure 2 for Unpack Local Model Interpretation for GBDT
Figure 3 for Unpack Local Model Interpretation for GBDT
Figure 4 for Unpack Local Model Interpretation for GBDT
Viaarxiv icon

Adapted tree boosting for Transfer Learning

Add code
Feb 27, 2020
Figure 1 for Adapted tree boosting for Transfer Learning
Figure 2 for Adapted tree boosting for Transfer Learning
Figure 3 for Adapted tree boosting for Transfer Learning
Figure 4 for Adapted tree boosting for Transfer Learning
Viaarxiv icon