Feb. 5, 2024, 8:10 p.m. | Man-Jie Yuan Zheng Zou Wei Gao

cs.CR updates on arXiv.org arxiv.org

Privacy-preserving neural networks have attracted increasing attention in recent years, and various algorithms have been developed to keep the balance between accuracy, computational complexity and information security from the cryptographic view. This work takes a different view from the input data and structure of neural networks. We decompose the input data (e.g., some images) into sensitive and insensitive segments according to importance and privacy. The sensitive segment includes some important and private information such as human faces and …

accuracy algorithms attention balance complexity computational cryptographic cs.cr cs.cv cs.lg data encrypted information information security input networks neural networks privacy security structure work

More from arxiv.org / cs.CR updates on arXiv.org

Cloud Support Engineer

@ General Dynamics Information Technology | USA UT Roy - 5770 Missile Way, Roy, UT 84067 (UTC018)

Senior SIEM Developer (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Director, Product Management (Cloud Application Security)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Cyber Security Specialist, Cyber Awareness Training & Strategic Projects

@ Grab | Petaling Jaya, Malaysia

Cyber Security Analyst (m/f/d)

@ Project A | Berlin

Cyber Security Analyst (m/w/d)

@ Project A | Berlin