YoVDO

Efficient Evaluation of Activation Functions over Encrypted Data

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Machine Learning Courses Deep Learning Courses Image Classification Courses Privacy Courses Activation Functions Courses Variational Autoencoders Courses Homomorphic Encryption Courses

Course Description

Overview

Explore a 23-minute conference talk presented at the 2nd Deep Learning and Security Workshop during the 2019 IEEE Symposium on Security & Privacy. Delve into a novel method for approximating bounded activation functions with encrypted input data, demonstrated through simulations in machine learning tasks. Learn about the application of this technique in a Variational Autoencoder for learning latent representations of MNIST data and an MNIST image classifier. Gain insights into the intersection of cryptography and deep learning, and understand how this approach can enhance privacy and security in machine learning applications.

Syllabus

Efficient Evaluation of Activation Functions over Encrypted Data


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Sensor Security
IEEE via YouTube
Tracking Ransomware End-to-end
IEEE via YouTube
Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
IEEE via YouTube
Algorithmic Transparency via Quantitative Input Influence - Theory and Experiments with Learning Systems
IEEE via YouTube
Bitcoin Over Tor Isn't a Good Idea
IEEE via YouTube