all InfoSec news
Hawk: Accurate and Fast Privacy-Preserving Machine Learning Using Secure Lookup Table Computation
March 27, 2024, 4:11 a.m. | Hamza Saleem, Amir Ziashahabi, Muhammad Naveed, Salman Avestimehr
cs.CR updates on arXiv.org arxiv.org
Abstract: Training machine learning models on data from multiple entities without direct data sharing can unlock applications otherwise hindered by business, legal, or ethical constraints. In this work, we design and implement new privacy-preserving machine learning protocols for logistic regression and neural network models. We adopt a two-server model where data owners secret-share their data between two servers that train and evaluate the model on the joint data. A significant source of inefficiency and inaccuracy in …
applications arxiv business can computation constraints cs.cr cs.lg data data sharing design entities ethical fast legal machine machine learning machine learning models network neural network privacy protocols sharing training unlock work
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC