Confidential Deep Learning: Executing Proprietary Models on Untrusted Devices

Add code
Aug 28, 2019
Figure 1 for Confidential Deep Learning: Executing Proprietary Models on Untrusted Devices

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: