no code implementations • 22 Apr 2024 • Huan Bao, Kaimin Wei, Yongdong Wu, Jin Qian, Robert H. Deng
Then, it randomly chooses latent codes from the latent probability distribution for recovering the private data.
no code implementations • 23 Feb 2023 • Xiaoguo Li, Bowen Zhao, Guomin Yang, Tao Xiang, Jian Weng, Robert H. Deng
To the best of our knowledge, this article is the first survey to review TEE-based secure computation protocols and the comprehensive comparison can serve as a guideline for selecting suitable protocols for deployment in practice.
no code implementations • 23 Sep 2020 • Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng
Previous works on federated learning have been inadequate in ensuring the privacy of DIs and the availability of the final federated model.
Cryptography and Security