2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2021
DOI: 10.1109/cvpr46437.2021.00224
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic Selective Encryption of Convolutional Neural Networks for Hierarchical Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…Tian et al [16] proposed PSS to select the important parameters from the convolutional layer parameters of CNN. Many studies [24][25][26][27] have shown that the parameters in CNNs are not of equal importance, so the performance of CNNs can be controlled by selecting a small number of more important parameters.…”
Section: Probabilistic Selection Strategymentioning
confidence: 99%
See 2 more Smart Citations
“…Tian et al [16] proposed PSS to select the important parameters from the convolutional layer parameters of CNN. Many studies [24][25][26][27] have shown that the parameters in CNNs are not of equal importance, so the performance of CNNs can be controlled by selecting a small number of more important parameters.…”
Section: Probabilistic Selection Strategymentioning
confidence: 99%
“…The number of layers where important parameters are located in VGG19 The reasons for choosing the VGG19 model are as follows. First, according to the study of Tian [16], encrypting the parameters of the VGG model by a few layers can control the model's performance to a greater extent. Second, VGG19 is a classification model with a greater tolerance for fluctuations in the output results in terms of values than models with complex output results such as the style migration model.…”
Section: Parameter Valuementioning
confidence: 99%
See 1 more Smart Citation
“…The model owner can only prove his or her copyright by verifying the watermark after the model is stolen. Therefore, some researchers have proposed the active authorization control method for models 6‐14 . If users can prove their legitimate right to use the model, they can activate the reasoning function of the model.…”
Section: Introductionmentioning
confidence: 99%
“…They added a control layer as the last layer in the DNN model. The control layer of the DNN model is deleted when entering a user's fingerprint, and then the reasoning function of the DNN model is used normally.Tian et al12 encrypted important parameters in the DNN model with a selective encryption algorithm. Different numbers of parameters are decrypted for different users, and hierarchical access services are provided to users.…”
mentioning
confidence: 99%