Secure Multiparty Computation Primitives
3
One-Way-Functions
Secure Multiparty Computation Meets Deep Learning
Preface
Secure Multiparty Computation Primitives
1
Beaver’s Triples Explained
2
Oblivious Transfer
3
One-Way-Functions
4
CrypTen
Deep Learning
5
Word Embeddings and Word2Vec
6
Recurrent Neural Networks
7
Long Short-Term Memory Networks
8
Sequence-to-Sequence (seq2seq) Encoder-Decoder Neural Networks
9
Attention for Neural Networks
10
Residual connections
11
Object Detection Algorithms
12
Implementation Guides for Yolo Object Detectors
13
AdderNet
V2X Applications
14
Red Light Violation Detection
15
Traffic Flow Forecasting
16
Summary
References
3
One-Way-Functions
2
Oblivious Transfer
4
CrypTen