Search Results for author: Cheng Hong

Found 6 papers, 2 papers with code

Privacy-preserving collaborative machine learning on genomic data using TensorFlow

1 code implementation11 Feb 2020 Cheng Hong, Zhicong Huang, Wen-jie Lu, Hunter Qu, Li Ma, Morten Dahl, Jason Mancuso

Machine learning (ML) methods have been widely used in genomic studies.

Cryptography and Security

Improving Utility and Security of the Shuffler-based Differential Privacy

1 code implementation30 Aug 2019 Tianhao Wang, Bolin Ding, Min Xu, Zhicong Huang, Cheng Hong, Jingren Zhou, Ninghui Li, Somesh Jha

When collecting information, local differential privacy (LDP) alleviates privacy concerns of users because their private information is randomized before being sent it to the central aggregator.

Secure Social Recommendation based on Secret Sharing

no code implementations6 Feb 2020 Chaochao Chen, Liang Li, Bingzhe Wu, Cheng Hong, Li Wang, Jun Zhou

It is well known that social information, which is rich on social platforms such as Facebook, are useful to recommender systems.

Privacy Preserving Recommendation Systems

Quantification of the Leakage in Federated Learning

no code implementations12 Oct 2019 Zhaorui Li, Zhicong Huang, Chaochao Chen, Cheng Hong

In this paper, we discuss the leakage based on a federated approximated logistic regression model and show that such gradient's leakage could leak the complete training data if all elements of the inputs are either 0 or 1.

Cryptography and Security

When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control

no code implementations20 Aug 2020 Chaochao Chen, Jun Zhou, Li Wang, Xibin Wu, Wenjing Fang, Jin Tan, Lei Wang, Alex X. Liu, Hao Wang, Cheng Hong

In this paper, we first present CAESAR, which combines HE and SS to build secure large-scale sparse logistic regression model and achieves both efficiency and security.

regression

Falcon: Fast Spectral Inference on Encrypted Data

no code implementations NeurIPS 2020 Qian Lou, Wen-jie Lu, Cheng Hong, Lei Jiang

We observed that HENNs have to pay significant computing overhead on rotations, and each of rotations is $\sim 10\times$ more expensive than homomorphic multiplications between ciphertext and plaintext.

Cannot find the paper you are looking for? You can Submit a new open access paper.