Search Results for author: Divya Gupta

Found 8 papers, 5 papers with code

Private Benchmarking to Prevent Contamination and Improve Comparative Evaluation of LLMs

no code implementations1 Mar 2024 Nishanth Chandran, Sunayana Sitaram, Divya Gupta, Rahul Sharma, Kashish Mittal, Manohar Swaminathan

To solve this problem, we propose Private Benchmarking, a solution where test datasets are kept private and models are evaluated without revealing the test data to the model.

Benchmarking

Privacy Preserving Multi-Agent Reinforcement Learning in Supply Chains

no code implementations9 Dec 2023 Ananta Mukherjee, Peeyush Kumar, Boling Yang, Nishanth Chandran, Divya Gupta

To tackle this challenge, we propose a game-theoretic, privacy-preserving mechanism, utilizing a secure multi-party computation (MPC) framework in MARL settings.

Multi-agent Reinforcement Learning Policy Gradient Methods +2

Efficient ML Models for Practical Secure Inference

no code implementations26 Aug 2022 Vinod Ganesan, Anwesh Bhattacharya, Pratyush Kumar, Divya Gupta, Rahul Sharma, Nishanth Chandran

For instance, the model provider could be a diagnostics company that has trained a state-of-the-art DenseNet-121 model for interpreting a chest X-ray and the user could be a patient at a hospital.

SIRNN: A Math Library for Secure RNN Inference

1 code implementation10 May 2021 Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi

Although prior work on secure 2-party inference provides specialized protocols for convolutional neural networks (CNNs), existing secure implementations of these math operators rely on generic 2-party computation (2PC) protocols that suffer from high communication.

Time Series Analysis

Secure Medical Image Analysis with CrypTFlow

1 code implementation9 Dec 2020 Javier Alvarez-Valle, Pratik Bhatu, Nishanth Chandran, Divya Gupta, Aditya Nori, Aseem Rastogi, Mayank Rathee, Rahul Sharma, Shubham Ugare

Our first component is an end-to-end compiler from TensorFlow to a variety of MPC protocols.

Cryptography and Security

CrypTFlow2: Practical 2-Party Secure Inference

1 code implementation13 Oct 2020 Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma

We present CrypTFlow2, a cryptographic framework for secure inference over realistic Deep Neural Networks (DNNs) using secure 2-party computation.

CrypTFlow: Secure TensorFlow Inference

4 code implementations16 Sep 2019 Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma

Finally, to provide malicious secure MPC protocols, our third component, Aramis, is a novel technique that uses hardware with integrity guarantees to convert any semi-honest MPC protocol into an MPC protocol that provides malicious security.

Cannot find the paper you are looking for? You can Submit a new open access paper.