2021
DOI: 10.1007/978-3-030-88418-5_25
|View full text |Cite
|
Sign up to set email alerts
|

: Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…It could be semi-honest, which means the cloud server will honestly follow the protocol for the federated learning service, yet is curious about individual model updates so as to infer clients' local datasets. The semi-honest threat model is commonly adopted in privacypreserving data-centric services in cloud computing [27], [28]. For this setting our system aims to maintain the confidentiality of individual model updates.…”
Section: Threat Modelmentioning
confidence: 99%
“…It could be semi-honest, which means the cloud server will honestly follow the protocol for the federated learning service, yet is curious about individual model updates so as to infer clients' local datasets. The semi-honest threat model is commonly adopted in privacypreserving data-centric services in cloud computing [27], [28]. For this setting our system aims to maintain the confidentiality of individual model updates.…”
Section: Threat Modelmentioning
confidence: 99%
“…In PrivGED, the power of the cloud is split into two cloud servers from different trust domains which can be hosted by different service providers in practice. Such multi-server model is getting increasingly popular in recent years for security designs in various domains, including both academia [32], [41][42][43][44][45][46][47] and industry [48], [49]. The adoption of such model in PrivGED follows this trend.…”
Section: Architecturementioning
confidence: 99%
“…What we need here essentially is secure comparison in the secret sharing domain. From the very recent works [18], [43], we identify two primitives suited to allow secure comparison in the secret sharing domain, and introduce two approaches accordingly to allow the realization of secure binning map generation. The first approach is based on FSS [18], which is more suited for high-latency network scenarios because it requires minimal rounds of interactions (at the cost of more local computation).…”
Section: Secure Binning Map Generationmentioning
confidence: 99%
See 2 more Smart Citations