Learning from teaching regularization: Generalizable correlations should be easy to imitate

C Jin, T Che, H Peng, Y Li, DN Metaxas… - arXiv preprint arXiv …, 2024 - arxiv.org
Generalization remains a central challenge in machine learning. In this work, we propose
Learning from Teaching (LoT), a novel regularization technique for deep neural networks to …

Lingcn: Structural linearized graph convolutional network for homomorphically encrypted inference

H Peng, R Ran, Y Luo, J Zhao… - Advances in …, 2024 - proceedings.neurips.cc
Abstract The growth of Graph Convolution Network (GCN) model sizes has revolutionized
numerous applications, surpassing human performance in areas such as personal …

Mpcvit: Searching for accurate and efficient mpc-friendly vision transformer with heterogeneous attention

W Zeng, M Li, W Xiong, T Tong, W Lu… - Proceedings of the …, 2023 - openaccess.thecvf.com
Secure multi-party computation (MPC) enables computation directly on encrypted data and
protects both data and model privacy in deep learning inference. However, existing neural …

CoPriv: network/protocol co-optimization for communication-efficient private inference

W Zeng, M Li, H Yang, W Lu… - Advances in Neural …, 2023 - proceedings.neurips.cc
Deep neural network (DNN) inference based on secure 2-party computation (2PC) can offer
cryptographically-secure privacy protection but suffers from orders of magnitude latency …

[PDF][PDF] MaxK-GNN: Extremely Fast GPU Kernel Design for Accelerating Graph Neural Networks Training

H Peng, X Xie, K Shivdikar, MD Hasan… - arXiv preprint arXiv …, 2023 - wiki.kaustubh.us
In the acceleration of deep neural network training, the graphics processing unit (GPU) has
become the mainstream platform. GPUs face substantial challenges on Graph Neural …

Panther: Practical Secure 2-Party Neural Network Inference

J Feng, Y Wu, H Sun, S Zhang… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
Secure two-party neural network (2P-NN) inference allows the server with a neural network
model and the client with inputs to perform neural network inference without revealing their …

Mpc-minimized secure llm inference

D Rathee, D Li, I Stoica, H Zhang, R Popa - arXiv preprint arXiv …, 2024 - arxiv.org
Many inference services based on large language models (LLMs) pose a privacy concern,
either revealing user prompts to the service or the proprietary weights to the user. Secure …

Optimizing search advertising strategies: Integrating reinforcement learning with generalized second-price auctions for enhanced ad ranking and bidding

C Zhou, Y Zhao, J Cao, Y Shen, J Gao, X Cui… - arXiv preprint arXiv …, 2024 - arxiv.org
This paper explores the integration of strategic optimization methods in search advertising,
focusing on ad ranking and bidding mechanisms within E-commerce platforms. By …

Qumos: A framework for preserving security of quantum machine learning model

Z Wang, J Li, Z Hu, B Gage… - … and Engineering (QCE …, 2023 - ieeexplore.ieee.org
Security has always been a critical issue in machine learning (ML) applications. Due to the
high cost of model training–such as collecting relevant samples, labeling data, and …

SpENCNN: orchestrating encoding and sparsity for fast homomorphically encrypted neural network inference

R Ran, X Luo, W Wang, T Liu, G Quan… - International …, 2023 - proceedings.mlr.press
Homomorphic Encryption (HE) is a promising technology to protect clients' data privacy for
Machine Learning as a Service (MLaaS) on public clouds. However, HE operations can be …