Crypto-Oriented Neural Architecture Design

27 Nov 20191 code implementation

We take a complementary approach, and provide design principles for optimizing the crypto-oriented neural network architectures to reduce the runtime of secure inference.

CrypTFlow: Secure TensorFlow Inference

16 Sep 20191 code implementation

Finally, to provide malicious secure MPC protocols, our third component, Aramis, is a novel technique that uses hardware with integrity guarantees to convert any semi-honest MPC protocol into an MPC protocol that provides malicious security.

Deep Pixel-wise Binary Supervision for Face Presentation Attack Detection

9 Jul 20191 code implementation

The proposed approach achieves an HTER of 0% in Replay Mobile dataset and an ACER of 0. 42% in Protocol-1 of OULU dataset outperforming state of the art methods.

FACE ANTI-SPOOFING FACE PRESENTATION ATTACK DETECTION FACE RECOGNITION

Cannot find the paper you are looking for? You can Submit a new open access paper.