Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
May 6, 2022 · Although a few studies have considered a malicious server that deviates from the protocol, they ignore the verification of model accuracy (where ...
Feb 27, 2023 · inference scheme that is secure against a malicious server and ... Fusion which achieves ... Muse: Secure inference resilient to malicious clients.
Although a few studies have considered a malicious server that deviates from the protocol, they ignore the verification of model accuracy. (where the malicious ...
Missing: Curious | Show results with:Curious
To demonstrate that a malicious client can completely break the security of semi-honest protocols, a new model-extraction attack against many ...
Fusion: Efficient and Secure Inference Resilient to Malicious Servers. ... Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious ...
Motivated by the severity of our attack, we design and implement MUSE, an efficient two-party secure inference protocol resilient to malicious clients. MUSE ...
Missing: Fusion: Server Curious
May 6, 2022 · Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients ... malicious server, and a curious client who may ...
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries · Computer Science. Journal of Cryptology · 2014.
Missing: Curious | Show results with:Curious
Fusion: Efficient and Secure Inference Resilient to Malicious Servers ... Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients.
In re- sponse, we design and implement MUSE, an efficient two- party secure inference protocol resilient to malicious clients. MUSE achieves online ...
Missing: Fusion: Curious