no code implementations • 19 Aug 2019 • Ahmad Al Badawi, Luong Hoang, Chan Fook Mun, Kim Laine, Khin Mi Mi Aung
In the second part, we show how to train a model using fully encrypted data to generate an encrypted model.
no code implementations • 2 Nov 2018 • Ahmad Al Badawi, Jin Chao, Jie Lin, Chan Fook Mun, Jun Jie Sim, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar
In this paper, we show how to accelerate the performance of running CNNs on encrypted data with GPUs.