no code implementations • 16 Oct 2022 • Arsany Guirguis, Diana Petrescu, Florin Dinu, Do Le Quoc, Javier Picorel, Rachid Guerraoui
This facilitates our second technique, storage-side batch adaptation, which enables increased concurrency in the storage tier while avoiding out-of-memory errors.
no code implementations • 3 Oct 2021 • Do Le Quoc, Christof Fetzer
Second, malicious clients can collude with each other to steal data, models from regular clients or corrupt the global training model.
no code implementations • 31 Mar 2021 • Wojciech Ozga, Do Le Quoc, Christof Fetzer
To address this problem, we designed and implemented Perun, a framework for confidential multi-stakeholder machine learning that allows users to make a trade-off between security and performance.
no code implementations • 20 Jan 2021 • Do Le Quoc, Franz Gregor, Sergei Arnautov, Roland Kunkel, Pramod Bhatotia, Christof Fetzer
To tackle this challenge, we designed secureTF, a distributed secure machine learning framework based on Tensorflow for the untrusted cloud infrastructure.
no code implementations • 11 Dec 2020 • Robert Krahn, Donald Dragoti, Franz Gregor, Do Le Quoc, Valerio Schiavoni, Pascal Felber, Clenimar Souza, Andrey Brito, Christof Fetzer
Currently, only a limited number of performance measurement tools for TEE-based applications exist and none offer performance monitoring and analysis during runtime.
Cryptography and Security Distributed, Parallel, and Cluster Computing Performance C.4
no code implementations • 12 Feb 2019 • Roland Kunkel, Do Le Quoc, Franz Gregor, Sergei Arnautov, Pramod Bhatotia, Christof Fetzer
This imposes significant security risks since modern online services rely on cloud computing to store and process the sensitive data.