VerifyTL: Secure and Verifiable Collaborative Transfer Learning

نویسندگان

چکیده

Getting access to labeled datasets in certain sensitive application domains can be challenging. Hence, one may resort transfer learning knowledge learned from a source domain with sufficient data target limited data. However, most existing techniques only focus on one-way which not benefit the domain. In addition, there is risk of malicious adversary corrupting number domains, consequently result inaccurate prediction or privacy leakage. this paper, we construct secure and Verif iable collaborative xmlns:xlink="http://www.w3.org/1999/xlink">T ransfer xmlns:xlink="http://www.w3.org/1999/xlink">L earning scheme, VerifyTL, support two-way over potentially untrusted by improving Furthermore, equip VerifyTL verifiable unit employing SPDZ computation provide guarantee verification multi-domain setting. Thus, against that compromise up $n-1$ out notation="LaTeX">$n$ domains. We analyze security evaluate its performance four real-world datasets. Experimental results show achieves significant gains schemes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Collaborative Learning Practices and Mobile Technology

During the past few years, mobile technologies have become common in everyday life. Almost everyone carry some kind of mobile technological equipment with him or her, for example a personal digital assistant (PDA), a mobile phone, a multimedia player, such as an iPod, or a laptop computer. The use of these equipments is not limited only to workplaces, schools or homes. Particularly useful infor...

متن کامل

Implementing a Secure Verifiable Auction

An online auction system provides a platform that allows users to exchange items. Such a platform raises a number of interesting security concerns that are in tension with each other. On one hand, each bidder wishes to keep her bid private so that other bidders do not gain an advantage over her in the present or subsequent auctions. On the other hand, bidders and regulating authorities want to ...

متن کامل

Verified Implementations for Secure and Verifiable Computation

Formal verification of the security of software systems is gradually moving from the traditional focus on idealized models, to the more ambitious goal of producing verified implementations. This trend is also present in recent work targeting the verification of cryptographic software, but the reach of existing tools has so far been limited to cryptographic primitives, such as RSA-OAEP encryptio...

متن کامل

Towards A Secure and Verifiable Future Internet

In recent years, there have been strong interests in the networking community in designing new Internet architectures. One of the driving forces behind these “clean-slate” designs is the need to address pressing security concerns of the Internet. As a consequence, recent architectures, such as SCION [8] and ICING [5], provide radically new architectures that claim to provide stronger security g...

متن کامل

Gracewipe: Secure and Verifiable Deletion under Coercion

For users in possession of password-protected encrypted data in persistent storage (i.e., “data at rest”), an obvious problem is that the password may be extracted by an adversary through dictionary attacks or by coercing the user. Techniques such as multi-level hidden volumes with plausible deniability, or software/hardware-based full disk encryption (FDE) cannot adequately address such an att...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2023

ISSN: ['1941-0018', '1545-5971', '2160-9209']

DOI: https://doi.org/10.1109/tdsc.2023.3241181