Nov. 6, 2023, 2:10 a.m. | Wenxuan Zeng, Meng Li, Haichuan Yang, Wen-jie Lu, Runsheng Wang, Ru Huang

cs.CR updates on arXiv.org arxiv.org

Deep neural network (DNN) inference based on secure 2-party computation (2PC)
can offer cryptographically-secure privacy protection but suffers from orders
of magnitude latency overhead due to enormous communication. Previous works
heavily rely on a proxy metric of ReLU counts to approximate the communication
overhead and focus on reducing the ReLUs to improve the communication
efficiency. However, we observe these works achieve limited communication
reduction for state-of-the-art (SOTA) 2PC protocols due to the ignorance of
other linear and non-linear operations, which …

communication computation focus latency magnitude metric network neural network offer optimization party privacy private protection protocol proxy

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC