1 code implementation • 11 Feb 2020 • Cheng Hong, Zhicong Huang, Wen-jie Lu, Hunter Qu, Li Ma, Morten Dahl, Jason Mancuso
Machine learning (ML) methods have been widely used in genomic studies.
Cryptography and Security
1 code implementation • 30 Aug 2019 • Tianhao Wang, Bolin Ding, Min Xu, Zhicong Huang, Cheng Hong, Jingren Zhou, Ninghui Li, Somesh Jha
When collecting information, local differential privacy (LDP) alleviates privacy concerns of users because their private information is randomized before being sent it to the central aggregator.
no code implementations • 6 Feb 2020 • Chaochao Chen, Liang Li, Bingzhe Wu, Cheng Hong, Li Wang, Jun Zhou
It is well known that social information, which is rich on social platforms such as Facebook, are useful to recommender systems.
no code implementations • 12 Oct 2019 • Zhaorui Li, Zhicong Huang, Chaochao Chen, Cheng Hong
In this paper, we discuss the leakage based on a federated approximated logistic regression model and show that such gradient's leakage could leak the complete training data if all elements of the inputs are either 0 or 1.
Cryptography and Security
no code implementations • 20 Aug 2020 • Chaochao Chen, Jun Zhou, Li Wang, Xibin Wu, Wenjing Fang, Jin Tan, Lei Wang, Alex X. Liu, Hao Wang, Cheng Hong
In this paper, we first present CAESAR, which combines HE and SS to build secure large-scale sparse logistic regression model and achieves both efficiency and security.
no code implementations • NeurIPS 2020 • Qian Lou, Wen-jie Lu, Cheng Hong, Lei Jiang
We observed that HENNs have to pay significant computing overhead on rotations, and each of rotations is $\sim 10\times$ more expensive than homomorphic multiplications between ciphertext and plaintext.