2022
DOI: 10.56553/popets-2022-0131
|View full text |Cite
|
Sign up to set email alerts
|

Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation

Abstract: Machine Learning (ML) algorithms, especially deep neural networks (DNN), have proven themselves to be extremely useful tools for data analysis, and are increasingly being deployed in systems operating on sensitive data, such as recommendation systems, banking fraud detection, and healthcare systems. This underscores the need for privacy-preserving ML (PPML) systems, and has inspired a line of research into how such systems can be constructed efficiently. However, most prior works on PPML achieve efficiency by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 47 publications
0
7
0
1
Order By: Relevance
“…This improves upon comparable state-of-the-art frameworks including ABY 3 [16], which achieved 94% accuracy in 2700 seconds, and FALCON [17], which reached the same accuracy in 780 seconds (online phase only). The aforementioned frameworks also converged after 15 training epochs, while Attrapadung et al [18] achieved convergence after just one epoch.…”
Section: Machine Learning With Mpcmentioning
confidence: 97%
See 1 more Smart Citation
“…This improves upon comparable state-of-the-art frameworks including ABY 3 [16], which achieved 94% accuracy in 2700 seconds, and FALCON [17], which reached the same accuracy in 780 seconds (online phase only). The aforementioned frameworks also converged after 15 training epochs, while Attrapadung et al [18] achieved convergence after just one epoch.…”
Section: Machine Learning With Mpcmentioning
confidence: 97%
“…A recent study from Attrapadung et al [18] focuses on developing secure and efficient protocols for computing the Adam (Adaptive moment estimation) optimisation algorithm. Optimisation algorithms may be added to a neural network architecture to improve the speed of convergence during training.…”
Section: Machine Learning With Mpcmentioning
confidence: 99%
“…We do not address the details of conventional threats of model/data thefts, which may exploit vulnerabilities in the development software, the development environment, the conventional software components in the system, the computing environment, and the operating organization. As a measure to prevent conventional data theft, secure multi-party computation is a technology for computing encrypted data without decrypting them, and has been actively studied for its applications to machine learning [56][57][58].…”
Section: Loss Of Confidentialitymentioning
confidence: 99%
“…Kemudian masuk ke tahap feature learning yang menggunakan lapisan konvolusi dengan aktivasi ReLU [12], MaxPooling, dan lapisan Fully Connected. Dari hasil lapisan Fully Connected tersebut akan dilakukan perubahan learning rate optimizer Adam [13] yang berbeda dan akan masuk ke metode Resnet-101v2 untuk menghitung hasil prediksi yang akan dijadikan accuracy, precision, dan recall. Metode Resnet-101v2 tersebut digunakan metode Skip Connection [14] yang akan membantu menentukan parameter dan pengulangan yang tepat agar dapat menghasilkan hasil prediksi dari arsitektur tersebut.…”
Section: Metodeunclassified