Skip to main content

Showing 1–7 of 7 results for author: Baruch, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.08610  [pdf, other

    cs.LG cs.CR

    Converting Transformers to Polynomial Form for Secure Inference Over Homomorphic Encryption

    Authors: Itamar Zimerman, Moran Baruch, Nir Drucker, Gilad Ezov, Omri Soceanu, Lior Wolf

    Abstract: Designing privacy-preserving deep learning models is a major challenge within the deep learning community. Homomorphic Encryption (HE) has emerged as one of the most promising approaches in this realm, enabling the decoupling of knowledge between the model owner and the data owner. Despite extensive research and application of this technology, primarily in convolutional neural networks, incorporat… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

    Comments: 6 figures

    ACM Class: F.2.2; I.2.7

  2. arXiv:2304.14836  [pdf, other

    cs.LG cs.AI cs.CR

    Training Large Scale Polynomial CNNs for E2E Inference over Homomorphic Encryption

    Authors: Moran Baruch, Nir Drucker, Gilad Ezov, Yoav Goldberg, Eyal Kushnir, Jenny Lerner, Omri Soceanu, Itamar Zimerman

    Abstract: Training large-scale CNNs that during inference can be run under Homomorphic Encryption (HE) is challenging due to the need to use only polynomial operations. This limits HE-based solutions adoption. We address this challenge and pioneer in providing a novel training method for large polynomial CNNs such as ResNet-152 and ConvNeXt models, and achieve promising accuracy on encrypted samples on larg… ▽ More

    Submitted 11 June, 2023; v1 submitted 26 April, 2023; originally announced April 2023.

  3. arXiv:2207.03384  [pdf, other

    cs.CR cs.LG

    HE-PEx: Efficient Machine Learning under Homomorphic Encryption using Pruning, Permutation and Expansion

    Authors: Ehud Aharoni, Moran Baruch, Pradip Bose, Alper Buyuktosunoglu, Nir Drucker, Subhankar Pal, Tomer Pelleg, Kanthi Sarpatwar, Hayim Shaul, Omri Soceanu, Roman Vaculin

    Abstract: Privacy-preserving neural network (NN) inference solutions have recently gained significant traction with several solutions that provide different latency-bandwidth trade-offs. Of these, many rely on homomorphic encryption (HE), a method of performing computations over encrypted data. However, HE operations even with state-of-the-art schemes are still considerably slow compared to their plaintext… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

  4. A methodology for training homomorphicencryption friendly neural networks

    Authors: Moran Baruch, Nir Drucker, Lev Greenberg, Guy Moshkowich

    Abstract: Privacy-preserving deep neural network (DNN) inference is a necessity in different regulated industries such as healthcare, finance and retail. Recently, homomorphic encryption (HE) has been used as a method to enable analytics while addressing privacy concerns. HE enables secure predictions over encrypted data. However, there are several challenges related to the use of HE, including DNN size lim… ▽ More

    Submitted 7 July, 2022; v1 submitted 5 November, 2021; originally announced November 2021.

  5. HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data

    Authors: Ehud Aharoni, Allon Adir, Moran Baruch, Nir Drucker, Gilad Ezov, Ariel Farkash, Lev Greenberg, Ramy Masalha, Guy Moshkowich, Dov Murik, Hayim Shaul, Omri Soceanu

    Abstract: Privacy-preserving solutions enable companies to offload confidential data to third-party services while fulfilling their government regulations. To accomplish this, they leverage various cryptographic techniques such as Homomorphic Encryption (HE), which allows performing computation on encrypted data. Most HE schemes work in a SIMD fashion, and the data packing method can dramatically affect the… ▽ More

    Submitted 1 January, 2023; v1 submitted 3 November, 2020; originally announced November 2020.

    Comments: 17 pages, 7 figures

    ACM Class: E.1; E.3

  6. arXiv:1902.06156  [pdf, other

    cs.LG cs.CR cs.DC stat.ML

    A Little Is Enough: Circumventing Defenses For Distributed Learning

    Authors: Moran Baruch, Gilad Baruch, Yoav Goldberg

    Abstract: Distributed learning is central for large-scale training of deep-learning models. However, they are exposed to a security threat in which Byzantine participants can interrupt or control the learning process. Previous attack models and their corresponding defenses assume that the rogue participants are (a) omniscient (know the data of all other participants), and (b) introduce large change to the p… ▽ More

    Submitted 16 February, 2019; originally announced February 2019.

    Journal ref: https://papers.nips.cc/paper/2019/hash/ec1c59141046cd1866bbbcdfb6ae31d4-Abstract.html

  7. arXiv:1802.04528  [pdf, other

    cs.LG cs.CR

    Deceiving End-to-End Deep Learning Malware Detectors using Adversarial Examples

    Authors: Felix Kreuk, Assi Barak, Shir Aviv-Reuven, Moran Baruch, Benny Pinkas, Joseph Keshet

    Abstract: In recent years, deep learning has shown performance breakthroughs in many applications, such as image detection, image segmentation, pose estimation, and speech recognition. However, this comes with a major concern: deep networks have been found to be vulnerable to adversarial examples. Adversarial examples are slightly modified inputs that are intentionally designed to cause a misclassification… ▽ More

    Submitted 10 January, 2019; v1 submitted 13 February, 2018; originally announced February 2018.