2023
DOI: 10.1109/tdsc.2022.3141391
|View full text |Cite
|
Sign up to set email alerts
|

Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 40 publications
0
11
0
Order By: Relevance
“…Besides, we mainly measure the performance of the SecCom operations. As shown in Table II, we see that the overheads of communication and the runtime of inference for the secure comparison (SecCom) protocol are notably less than the prior works [22], [33], [34]. We analyze that our secure comparison protocol over the 32-bit number achieves 2×, 2×, 75.6× bandwidth savings and 3.5×, 2×, 30.6× runtime savings compared with the prior works [22], [33], [34].…”
Section: Microbenchmarksmentioning
confidence: 85%
See 3 more Smart Citations
“…Besides, we mainly measure the performance of the SecCom operations. As shown in Table II, we see that the overheads of communication and the runtime of inference for the secure comparison (SecCom) protocol are notably less than the prior works [22], [33], [34]. We analyze that our secure comparison protocol over the 32-bit number achieves 2×, 2×, 75.6× bandwidth savings and 3.5×, 2×, 30.6× runtime savings compared with the prior works [22], [33], [34].…”
Section: Microbenchmarksmentioning
confidence: 85%
“…As shown in Table II, we see that the overheads of communication and the runtime of inference for the secure comparison (SecCom) protocol are notably less than the prior works [22], [33], [34]. We analyze that our secure comparison protocol over the 32-bit number achieves 2×, 2×, 75.6× bandwidth savings and 3.5×, 2×, 30.6× runtime savings compared with the prior works [22], [33], [34]. To ensure our secure protocols have strong scalability, we put n numbers into an array of Pytorch to execute vectorization operations in parallel instead of doing secure comparisons one by one.…”
Section: Microbenchmarksmentioning
confidence: 87%
See 2 more Smart Citations
“…Compared to previous schemes based on additive secret-sharing techniques, Falcon utilizes three-party replicated secret-sharing techniques to achieve faster runtimes and lower communication overhead. Sonic [20] designs a series of secure and efficient neural network layer functions based on additive secret sharing [18]. Sonic's secure computation protocol runs between two computational parties.…”
Section: Related Workmentioning
confidence: 99%