ToNN: An oblivious neural network prediction scheme with semi-honest TEE

W Xu, H Zhu, Y Zheng, F Wang, J Hua… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the rapid advancements in machine learning and the widespread adoption of Model-as-
a-Service (MaaS) platforms, there has been significant attention on convolutional neural …

Mind Your Enclave Pointers! Detecting Privacy Leaks for SGX Apps via Sparse Taint Analysis

Y Chen, J Jiang, S Yan, H Xu - 2023 IEEE 34th International …, 2023 - ieeexplore.ieee.org
Intel SGX is a promising TEE technique that can protect programs running in user space
from being maliciously accessed by the host operating system. Although it provides …

Data Leakage Mitigation of User-Defined Functions on Secure Personal Data Management Systems

R Carpentier, I Sandu Popa, N Anciaux - Proceedings of the 34th …, 2022 - dl.acm.org
Personal Data Management Systems (PDMSs) arrive at a rapid pace providing individuals
with appropriate tools to collect, manage and share their personal data. At the same time …

Randomized response mechanisms for differential privacy data analysis: Bounds and applications

F Ma, P Wang - arXiv preprint arXiv:2112.07397, 2021 - arxiv.org
Randomized response, as a basic building-block for differentially private mechanism, has
given rise to great interest and found various potential applications in science communities …

Enabling secure data-driven applications: an approach to personal data management using trusted execution environments

R Carpentier, I Sandu Popa, N Anciaux - Distributed and Parallel …, 2025 - Springer
In a rapidly evolving landscape, Personal Data Management Systems (PDMSs) provide
individuals with the necessary tools to collect, manage and share their personal data. At the …

A Method to Improve the Accuracy of Personal Information Detection

CC Chiu, CS Yang, CK Shieh - Journal of Computer and Communications, 2023 - scirp.org
It is necessary to confirm the personal data factors and the rules of verification before
conducting personal data detection. So that the detection method can be written in the …

Privacy-preserving third-party computations on secure personal data management systems

R Carpentier - 2022 - inria.hal.science
The privacy of individuals is constantly undermined by some of the most prominent
companies in the world which centralize vast amounts of personal data. Recent legal means …

[PDF][PDF] Science of Tracking, Control and Optimization of Information Latency for Dynamic Military IoT Systems

JH Reed - 2022 - muri.ictas.vt.edu
Science of Tracking, Control and Optimization of Information Latency for Dynamic Military IoT
Systems Page 1 A Report for MURI Project (FY’20 – FY’22) Science of Tracking, Control and …

Hardware-Aided Privacy Protection and Cyber Defense for IoT

R Zhang - 2020 - vtechworks.lib.vt.edu
With recent advances in electronics and communication technologies, our daily lives are
immersed in an environment of Internet-connected smart things. Despite the great …

[引用][C] computations on secure personal data management systems

R CARPENTIER