Skip to main content

Showing 1–4 of 4 results for author: Tan, B H M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2212.04371  [pdf

    cs.LG cs.CR

    Skellam Mixture Mechanism: a Novel Approach to Federated Learning with Differential Privacy

    Authors: Ergute Bao, Yizheng Zhu, Xiaokui Xiao, Yin Yang, Beng Chin Ooi, Benjamin Hong Meng Tan, Khin Mi Mi Aung

    Abstract: Deep neural networks have strong capabilities of memorizing the underlying training data, which can be a serious privacy concern. An effective solution to this problem is to train models with differential privacy, which provides rigorous privacy guarantees by injecting random noise to the gradients. This paper focuses on the scenario where sensitive data are distributed among multiple participants… ▽ More

    Submitted 2 July, 2024; v1 submitted 8 December, 2022; originally announced December 2022.

  2. arXiv:1902.04303  [pdf, other

    stat.AP cs.CR q-bio.GN

    Achieving GWAS with Homomorphic Encryption

    Authors: Jun Jie Sim, Fook Mun Chan, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung

    Abstract: One way of investigating how genes affect human traits would be with a genome-wide association study (GWAS). Genetic markers, known as single-nucleotide polymorphism (SNP), are used in GWAS. This raises privacy and security concerns as these genetic markers can be used to identify individuals uniquely. This problem is further exacerbated by a large number of SNPs needed, which produce reliable res… ▽ More

    Submitted 1 August, 2019; v1 submitted 12 February, 2019; originally announced February 2019.

  3. arXiv:1811.00778  [pdf, other

    cs.CR cs.LG

    Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs

    Authors: Ahmad Al Badawi, ** Chao, Jie Lin, Chan Fook Mun, Jun Jie Sim, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar

    Abstract: Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model whereas the user has samples on which she wants to run the model. The biggest concern with DLaaS is user privacy if the input samples are sensitive data. We provide here an efficient privacy-preserving system by employing high-end technologies… ▽ More

    Submitted 18 August, 2020; v1 submitted 2 November, 2018; originally announced November 2018.

  4. arXiv:1802.05004  [pdf, ps, other

    cs.CR

    Zero-Knowledge Password Policy Check from Lattices

    Authors: Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang

    Abstract: Passwords are ubiquitous and most commonly used to authenticate users when logging into online services. Using high entropy passwords is critical to prevent unauthorized access and password policies emerged to enforce this requirement on passwords. However, with current methods of password storage, poor practices and server breaches have leaked many passwords to the public. To protect one's sensit… ▽ More

    Submitted 14 February, 2018; originally announced February 2018.

    Journal ref: ISC 2017