ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2207.00083
  4. Cited By
DarKnight: An Accelerated Framework for Privacy and Integrity Preserving
  Deep Learning Using Trusted Hardware

DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware

30 June 2022
H. Hashemi
Yongqin Wang
M. Annavaram
    FedML
ArXivPDFHTML

Papers citing "DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware"

25 / 25 papers shown
Title
TEESlice: Protecting Sensitive Neural Network Models in Trusted
  Execution Environments When Attackers have Pre-Trained Models
TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained Models
Ding Li
Ziqi Zhang
Mengyu Yao
Y. Cai
Yao Guo
Xiangqun Chen
FedML
37
2
0
15 Nov 2024
Ascend-CC: Confidential Computing on Heterogeneous NPU for Emerging
  Generative AI Workloads
Ascend-CC: Confidential Computing on Heterogeneous NPU for Emerging Generative AI Workloads
Aritra Dhar
Clément Thorens
Lara Magdalena Lazier
Lukas Cavigelli
41
1
0
16 Jul 2024
AuthNet: Neural Network with Integrated Authentication Logic
AuthNet: Neural Network with Integrated Authentication Logic
Yuling Cai
Fan Xiang
Guozhu Meng
Yinzhi Cao
Kai Chen
AAML
46
0
0
24 May 2024
TransLinkGuard: Safeguarding Transformer Models Against Model Stealing
  in Edge Deployment
TransLinkGuard: Safeguarding Transformer Models Against Model Stealing in Edge Deployment
Qinfeng Li
Zhiqiang Shen
Zhenghan Qin
Yangfan Xie
Xuhong Zhang
Tianyu Du
Jianwei Yin
27
8
0
17 Apr 2024
Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer
  IoT Devices
Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer IoT Devices
Xueshuo Xie
Haoxu Wang
Zhaolong Jian
Tao Li
Wei Wang
Zhiwei Xu
Gui-Ping Wang
36
2
0
19 Mar 2024
Edge Private Graph Neural Networks with Singular Value Perturbation
Edge Private Graph Neural Networks with Singular Value Perturbation
Tingting Tang
Yue Niu
A. Avestimehr
Murali Annavaram
AAML
24
1
0
16 Mar 2024
Tempo: Confidentiality Preservation in Cloud-Based Neural Network
  Training
Tempo: Confidentiality Preservation in Cloud-Based Neural Network Training
Rongwu Xu
Zhixuan Fang
FedML
16
0
0
21 Jan 2024
All Rivers Run to the Sea: Private Learning with Asymmetric Flows
All Rivers Run to the Sea: Private Learning with Asymmetric Flows
Yue Niu
Ramy E. Ali
Saurav Prakash
Salman Avestimehr
FedML
23
2
0
05 Dec 2023
SparseLock: Securing Neural Network Models in Deep Learning Accelerators
SparseLock: Securing Neural Network Models in Deep Learning Accelerators
Nivedita Shrivastava
S. Sarangi
AAML
25
1
0
05 Nov 2023
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN
  Partition for On-Device ML
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML
Ziqi Zhang
Chen Gong
Yifeng Cai
Yuanyuan Yuan
Bingyan Liu
Ding Li
Yao Guo
Xiangqun Chen
FedML
37
16
0
11 Oct 2023
A Generative Framework for Low-Cost Result Validation of Machine
  Learning-as-a-Service Inference
A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service Inference
Abhinav Kumar
Miguel A. Guirao Aguilera
R. Tourani
S. Misra
AAML
19
0
0
31 Mar 2023
Edge Deep Learning Model Protection via Neuron Authorization
Edge Deep Learning Model Protection via Neuron Authorization
Jinyin Chen
Haibin Zheng
T. Liu
Rongchang Li
Yao Cheng
Xuhong Zhang
S. Ji
FedML
11
0
0
22 Mar 2023
A Survey of Secure Computation Using Trusted Execution Environments
A Survey of Secure Computation Using Trusted Execution Environments
Xiaoguo Li
Bowen Zhao
Guomin Yang
Tao Xiang
J. Weng
R. Deng
11
9
0
23 Feb 2023
Proof of Unlearning: Definitions and Instantiation
Proof of Unlearning: Definitions and Instantiation
Jiasi Weng
Shenglong Yao
Yuefeng Du
Junjie Huang
Jian Weng
Cong Wang
MU
24
12
0
20 Oct 2022
DiVa: An Accelerator for Differentially Private Machine Learning
DiVa: An Accelerator for Differentially Private Machine Learning
Beom-Joo Park
Ranggi Hwang
Dongho Yoon
Yoonhyuk Choi
Minsoo Rhu
6
8
0
26 Aug 2022
Verifiable Encodings for Secure Homomorphic Analytics
Verifiable Encodings for Secure Homomorphic Analytics
Sylvain Chatel
Christian Knabenhans
Apostolos Pyrgelis
Carmela Troncoso
Jean-Pierre Hubaux
19
19
0
28 Jul 2022
Edge Security: Challenges and Issues
Edge Security: Challenges and Issues
Xin Jin
Charalampos Katsis
Fan Sang
Jiahao Sun
A. Kundu
Ramana Rao Kompella
39
8
0
14 Jun 2022
Seculator: A Fast and Secure Neural Processing Unit
Seculator: A Fast and Secure Neural Processing Unit
Nivedita Shrivastava
S. Sarangi
AAML
16
3
0
19 Apr 2022
Enabling All In-Edge Deep Learning: A Literature Review
Enabling All In-Edge Deep Learning: A Literature Review
Praveen Joshi
Mohammed Hasanuzzaman
Chandra Thapa
Haithem Afli
T. Scully
21
22
0
07 Apr 2022
CryptoNite: Revealing the Pitfalls of End-to-End Private Inference at
  Scale
CryptoNite: Revealing the Pitfalls of End-to-End Private Inference at Scale
Karthik Garimella
N. Jha
Zahra Ghodsi
S. Garg
Brandon Reagen
21
3
0
04 Nov 2021
3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs
3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs
Yue Niu
Ramy E. Ali
Salman Avestimehr
FedML
44
17
0
04 Oct 2021
Adaptive Verifiable Coded Computing: Towards Fast, Secure and Private
  Distributed Machine Learning
Adaptive Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning
Ting-long Tang
Ramy E. Ali
H. Hashemi
Tynan Gangwani
A. Avestimehr
M. Annavaram
36
13
0
27 Jul 2021
Secure and Fault Tolerant Decentralized Learning
Secure and Fault Tolerant Decentralized Learning
Saurav Prakash
H. Hashemi
Yongqin Wang
M. Annavaram
Salman Avestimehr
FedML
16
10
0
15 Oct 2020
Amplification by Shuffling: From Local to Central Differential Privacy
  via Anonymity
Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity
Ulfar Erlingsson
Vitaly Feldman
Ilya Mironov
A. Raghunathan
Kunal Talwar
Abhradeep Thakurta
136
420
0
29 Nov 2018
Slalom: Fast, Verifiable and Private Execution of Neural Networks in
  Trusted Hardware
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware
Florian Tramèr
Dan Boneh
FedML
114
395
0
08 Jun 2018
1