{"id":2827,"date":"2023-01-12T13:57:58","date_gmt":"2023-01-12T13:57:58","guid":{"rendered":"https:\/\/harpocrates-project.eu\/publications\/"},"modified":"2023-09-12T09:24:55","modified_gmt":"2023-09-12T09:24:55","slug":"publications","status":"publish","type":"page","link":"https:\/\/harpocrates-project.eu\/fr\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#1f2437&Prime; background_enable_image=\u00a0\u00bboff\u00a0\u00bb background_position=\u00a0\u00bbcenter_left\u00a0\u00bb custom_padding=\u00a0\u00bb0rem|1rem|0rem|1rem|true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|2rem|1rem|2rem|false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb|1rem||1rem|false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bb1540px\u00a0\u00bb custom_padding=\u00a0\u00bb||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb1rem||1rem||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.19.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][lwp_divi_breadcrumbs link_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb separator_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb1rem||1rem||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb1rem||1rem||false|false\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/lwp_divi_breadcrumbs][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb|1rem||1rem|false|true\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|2rem||2rem|false|true\u00a0\u00bb custom_padding_phone=\u00a0\u00bb|1rem||1rem|false|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.19.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bb1540px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.19.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb border_color_right=\u00a0\u00bb#9b9b9b\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.19.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbMontserrat|600|||||||\u00a0\u00bb header_text_color=\u00a0\u00bb#1f2437&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1>Articles scientifiques et techniques relatifs \u00e0 notre projet<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.19.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n\n<table id=\"tablepress-2\" class=\"tablepress tablepress-id-2\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Published Papers<\/th><th class=\"column-2\">Link<\/th><th class=\"column-3\">Repository Link<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">Bin Liu, Antonis Michalas and Bogdan Warinschi. \u201cCryptographic Role-Based Access Control, Reconsidered\u201d. Proceedings of the 16th International Conference on Provable and Practical Security (ProvSec\u201922), Nanjing, China, 11\u201312 November 2022.<\/td><td class=\"column-2\"><a href=\"https:\/\/eprint.iacr.org\/2022\/1268.pdf\" rel=\"noopener\" target=\"_blank\">https:\/\/eprint.iacr.org\/2022\/1268.pdf<\/a><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">R. Guanciale, N. Paladi and A. Vahidi, \"SoK: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing,\" 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), Storrs, CT, USA, 2022, pp. 109-120, doi: 10.1109\/SEED55351.2022.00017.<\/td><td class=\"column-2\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9935023\" rel=\"noopener\" target=\"_blank\">https:\/\/ieeexplore.ieee.org\/abstract\/document\/9935023<\/a><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">Alexandros Bakas, Eugene Frimpong and Antonis Michalas. \u201cSymmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives\u201d. Proceedings of the 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm\u201922), Kansas City, United States, October 17\u201319, 2022.<\/td><td class=\"column-2\"><a href=\"https:\/\/eprint.iacr.org\/2022\/848.pdf\" rel=\"noopener\" target=\"_blank\">https:\/\/eprint.iacr.org\/2022\/848.pdf<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/iammrgenie\/hhe_ppml\">https:\/\/github.com\/iammrgenie\/hhe_ppml<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">Alexandros Bakas, Antonis Michalas, Eugene Frimpong and Reyhaneh Rabbaninejad. \u201cFeel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors\u201d. Proceedings of the 36th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec\u201922), Newark, NJ, USA, July 18\u201320, 2022.<\/td><td class=\"column-2\"><a href=\"https:\/\/eprint.iacr.org\/2022\/629\" rel=\"noopener\" target=\"_blank\">https:\/\/eprint.iacr.org\/2022\/629<\/a><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">Title: stoRNA: Stateless Transparent Proofs of Storage-time<br \/>\n<br \/>\nAuthors: Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas and Amir Nabizadeh<br \/>\n<br \/>\nVenue: Proceedings of the 28th European Symposium on Research in Computer Security (ESORICS 2023), Hague, the Netherlands, September 25\u201329, 2023.<\/td><td class=\"column-2\"><a href=\"https:\/\/eprint.iacr.org\/2023\/515.pdf\" rel=\"noopener\" target=\"_blank\">https:\/\/eprint.iacr.org\/2023\/515.pdf<\/a><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">Title: Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning<br \/>\n<br \/>\nAuthors: Tanveer Khan, Khoa Nguyen and Antonis Michalas<br \/>\n<br \/>\nVenue: Proceedings of the 5th International Workshop on Health Data Management in the Era of AI (HeDAI'23), co-located with the 26th International Conference on Extending Database Technology, 28-31 March, 2023, Ioannina, Greece.<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/pdf\/2301.08778.pdf\" rel=\"noopener\" target=\"_blank\">https:\/\/arxiv.org\/pdf\/2301.08778.pdf<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/khoaguin\/HESplitNet\">https:\/\/github.com\/khoaguin\/HESplitNet<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"> <br \/>\nHan Wang, David Eklund, Alina Oprea, Shahid Raza - \"FL4IoT: IoT Device Fingerprinting and Identification using Federated Learning\", Published: 09 June 2023<br \/>\n<br \/>\n <\/td><td class=\"column-2\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3603257\" rel=\"noopener\" target=\"_blank\">https:\/\/dl.acm.org\/doi\/10.1145\/3603257<\/a><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">Tanveer Khan, Antonis Michalas: Learning in the Dark: Privacy-Preserving Machine<br \/>\nLearning using Function Approximation<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/abs\/2309.08190\">https:\/\/arxiv.org\/abs\/2309.08190<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/gitlab.com\/nisec\/blind_faith\">https:\/\/gitlab.com\/nisec\/blind_faith<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">Tanveer Khan, Khoa Nguyen, Antonis Michalas: A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning<\/td><td class=\"column-2\"><a href=\"http:\/\/arxiv.org\/abs\/2309.08697\">http:\/\/arxiv.org\/abs\/2309.08697<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/khoaguin\/HESplitNet\">https:\/\/github.com\/khoaguin\/HESplitNet<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">Tanveer Khan, Khoa Nguyen, Antonis Michalas  and Alexandros Bakas: Love or Hate? Share or Split? Privacy-Preserving Training<br \/>\nUsing Split Learning and Homomorphic Encryption<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/abs\/2309.10517\">https:\/\/arxiv.org\/abs\/2309.10517<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/khoaguin\/HESplitNet\">https:\/\/github.com\/khoaguin\/HESplitNet<\/a><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">Khoa Nguyen, Tanveer Khan, Antonis Michalas: Split Without a Leak: Reducing Privacy Leakage<br \/>\nin Split Learning<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/abs\/2308.15783\">https:\/\/arxiv.org\/abs\/2308.15783<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/khoaguin\/HESplitNet\">https:\/\/github.com\/khoaguin\/HESplitNet<\/a><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">Eugene Frimpong, Khoa Nguyen, Mindaugas Budzys, Tanveer Khan, Antonis Michalas: GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption<br \/>\n<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/abs\/2401.14840\">https:\/\/arxiv.org\/abs\/2401.14840<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/iammrgenie\/hhe_ppml\">https:\/\/github.com\/iammrgenie\/hhe_ppml<\/a><\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">Eugene Frimpong, Alexandros Bakas, Camille Foucault and Antonis Michalas. \u201cNeed for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices\u201d. In Proceedings of the 9th International Conference on IoT, BigData and Security (IoTBDS\u201924), Angers, France, 28\u201330 April 2024.<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/pdf\/2401.14840.pdf\">https:\/\/arxiv.org\/pdf\/2401.14840.pdf<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/iammrgenie\/sumFE_v2\">https:\/\/github.com\/iammrgenie\/sumFE_v2<\/a><\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">Tanveer Khan, Mindaugas Budzys, Khoa Nguyen and Antonis Michalas. \u201cWildest Dreams: Reproducible Research in Privacy-Preserving Neural Network Training \u201d. In Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS\u201924), Bristol, U.K., 15\u201320 July 2024.<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/pdf\/2403.03592.pdf\">https:\/\/arxiv.org\/pdf\/2403.03592.pdf<\/a><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">Tanveer Khan, Mindaugas Budzys and Antonis Michalas: \"Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning\". 15\u201417 May, 2024, San Antonio, Texas, USA<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/pdf\/2404.09265.pdf\">https:\/\/arxiv.org\/pdf\/2404.09265.pdf<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/UnoriginalOrigi\/SplitFSS\">https:\/\/github.com\/UnoriginalOrigi\/SplitFSS<\/a><\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">Camille Foucault, Reyhaneh Rabbaninejad, Tassos Dimitriou and Antonis Michalas: \"FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption\". 15\u201417 May, 2024, San Antonio, Texas, USA.<\/td><td class=\"column-2\"><a href=\"https:\/\/eprint.iacr.org\/2024\/660.pdf\">https:\/\/eprint.iacr.org\/2024\/660.pdf<\/a><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><div class=\"et_pb_module lwp_divi_breadcrumbs lwp_divi_breadcrumbs_0\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t<div class=\"lwp-breadcrumbs\"> <span class=\"before\"><\/span> <span vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\"><span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" href=\"https:\/\/harpocrates-project.eu\/fr\/\" class=\"home\"><span property=\"name\">Home<\/span><\/a><meta property=\"position\" content=\"1\"><\/span> <span class=\"separator et-pb-icon\">&amp;#x39;<\/span> <\/span><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>Articles scientifiques et techniques relatifs \u00e0 notre projet\n<table id=\"tablepress-2-no-2\" class=\"tablepress tablepress-id-2\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Published Papers<\/th><th class=\"column-2\">Link<\/th><th class=\"column-3\">Repository Link<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">Bin Liu, Antonis Michalas and Bogdan Warinschi. \u201cCryptographic Role-Based Access Control, Reconsidered\u201d. Proceedings of the 16th International Conference on Provable and Practical Security (ProvSec\u201922), Nanjing, China, 11\u201312 November 2022.<\/td><td class=\"column-2\"><a href=\"https:\/\/eprint.iacr.org\/2022\/1268.pdf\" rel=\"noopener\" target=\"_blank\">https:\/\/eprint.iacr.org\/2022\/1268.pdf<\/a><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">R. Guanciale, N. Paladi and A. Vahidi, \"SoK: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing,\" 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), Storrs, CT, USA, 2022, pp. 109-120, doi: 10.1109\/SEED55351.2022.00017.<\/td><td class=\"column-2\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9935023\" rel=\"noopener\" target=\"_blank\">https:\/\/ieeexplore.ieee.org\/abstract\/document\/9935023<\/a><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">Alexandros Bakas, Eugene Frimpong and Antonis Michalas. \u201cSymmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives\u201d. Proceedings of the 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm\u201922), Kansas City, United States, October 17\u201319, 2022.<\/td><td class=\"column-2\"><a href=\"https:\/\/eprint.iacr.org\/2022\/848.pdf\" rel=\"noopener\" target=\"_blank\">https:\/\/eprint.iacr.org\/2022\/848.pdf<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/iammrgenie\/hhe_ppml\">https:\/\/github.com\/iammrgenie\/hhe_ppml<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">Alexandros Bakas, Antonis Michalas, Eugene Frimpong and Reyhaneh Rabbaninejad. \u201cFeel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors\u201d. Proceedings of the 36th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec\u201922), Newark, NJ, USA, July 18\u201320, 2022.<\/td><td class=\"column-2\"><a href=\"https:\/\/eprint.iacr.org\/2022\/629\" rel=\"noopener\" target=\"_blank\">https:\/\/eprint.iacr.org\/2022\/629<\/a><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">Title: stoRNA: Stateless Transparent Proofs of Storage-time<br \/>\n<br \/>\nAuthors: Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas and Amir Nabizadeh<br \/>\n<br \/>\nVenue: Proceedings of the 28th European Symposium on Research in Computer Security (ESORICS 2023), Hague, the Netherlands, September 25\u201329, 2023.<\/td><td class=\"column-2\"><a href=\"https:\/\/eprint.iacr.org\/2023\/515.pdf\" rel=\"noopener\" target=\"_blank\">https:\/\/eprint.iacr.org\/2023\/515.pdf<\/a><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">Title: Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning<br \/>\n<br \/>\nAuthors: Tanveer Khan, Khoa Nguyen and Antonis Michalas<br \/>\n<br \/>\nVenue: Proceedings of the 5th International Workshop on Health Data Management in the Era of AI (HeDAI'23), co-located with the 26th International Conference on Extending Database Technology, 28-31 March, 2023, Ioannina, Greece.<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/pdf\/2301.08778.pdf\" rel=\"noopener\" target=\"_blank\">https:\/\/arxiv.org\/pdf\/2301.08778.pdf<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/khoaguin\/HESplitNet\">https:\/\/github.com\/khoaguin\/HESplitNet<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"> <br \/>\nHan Wang, David Eklund, Alina Oprea, Shahid Raza - \"FL4IoT: IoT Device Fingerprinting and Identification using Federated Learning\", Published: 09 June 2023<br \/>\n<br \/>\n <\/td><td class=\"column-2\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3603257\" rel=\"noopener\" target=\"_blank\">https:\/\/dl.acm.org\/doi\/10.1145\/3603257<\/a><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">Tanveer Khan, Antonis Michalas: Learning in the Dark: Privacy-Preserving Machine<br \/>\nLearning using Function Approximation<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/abs\/2309.08190\">https:\/\/arxiv.org\/abs\/2309.08190<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/gitlab.com\/nisec\/blind_faith\">https:\/\/gitlab.com\/nisec\/blind_faith<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">Tanveer Khan, Khoa Nguyen, Antonis Michalas: A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning<\/td><td class=\"column-2\"><a href=\"http:\/\/arxiv.org\/abs\/2309.08697\">http:\/\/arxiv.org\/abs\/2309.08697<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/khoaguin\/HESplitNet\">https:\/\/github.com\/khoaguin\/HESplitNet<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">Tanveer Khan, Khoa Nguyen, Antonis Michalas  and Alexandros Bakas: Love or Hate? Share or Split? Privacy-Preserving Training<br \/>\nUsing Split Learning and Homomorphic Encryption<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/abs\/2309.10517\">https:\/\/arxiv.org\/abs\/2309.10517<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/khoaguin\/HESplitNet\">https:\/\/github.com\/khoaguin\/HESplitNet<\/a><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">Khoa Nguyen, Tanveer Khan, Antonis Michalas: Split Without a Leak: Reducing Privacy Leakage<br \/>\nin Split Learning<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/abs\/2308.15783\">https:\/\/arxiv.org\/abs\/2308.15783<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/khoaguin\/HESplitNet\">https:\/\/github.com\/khoaguin\/HESplitNet<\/a><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">Eugene Frimpong, Khoa Nguyen, Mindaugas Budzys, Tanveer Khan, Antonis Michalas: GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption<br \/>\n<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/abs\/2401.14840\">https:\/\/arxiv.org\/abs\/2401.14840<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/iammrgenie\/hhe_ppml\">https:\/\/github.com\/iammrgenie\/hhe_ppml<\/a><\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">Eugene Frimpong, Alexandros Bakas, Camille Foucault and Antonis Michalas. \u201cNeed for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices\u201d. In Proceedings of the 9th International Conference on IoT, BigData and Security (IoTBDS\u201924), Angers, France, 28\u201330 April 2024.<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/pdf\/2401.14840.pdf\">https:\/\/arxiv.org\/pdf\/2401.14840.pdf<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/iammrgenie\/sumFE_v2\">https:\/\/github.com\/iammrgenie\/sumFE_v2<\/a><\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">Tanveer Khan, Mindaugas Budzys, Khoa Nguyen and Antonis Michalas. \u201cWildest Dreams: Reproducible Research in Privacy-Preserving Neural Network Training \u201d. In Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS\u201924), Bristol, U.K., 15\u201320 July 2024.<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/pdf\/2403.03592.pdf\">https:\/\/arxiv.org\/pdf\/2403.03592.pdf<\/a><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">Tanveer Khan, Mindaugas Budzys and Antonis Michalas: \"Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning\". 15\u201417 May, 2024, San Antonio, Texas, USA<\/td><td class=\"column-2\"><a href=\"https:\/\/arxiv.org\/pdf\/2404.09265.pdf\">https:\/\/arxiv.org\/pdf\/2404.09265.pdf<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/github.com\/UnoriginalOrigi\/SplitFSS\">https:\/\/github.com\/UnoriginalOrigi\/SplitFSS<\/a><\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">Camille Foucault, Reyhaneh Rabbaninejad, Tassos Dimitriou and Antonis Michalas: \"FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption\". 15\u201417 May, 2024, San Antonio, Texas, USA.<\/td><td class=\"column-2\"><a href=\"https:\/\/eprint.iacr.org\/2024\/660.pdf\">https:\/\/eprint.iacr.org\/2024\/660.pdf<\/a><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2827","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/harpocrates-project.eu\/fr\/wp-json\/wp\/v2\/pages\/2827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/harpocrates-project.eu\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/harpocrates-project.eu\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/harpocrates-project.eu\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/harpocrates-project.eu\/fr\/wp-json\/wp\/v2\/comments?post=2827"}],"version-history":[{"count":1,"href":"https:\/\/harpocrates-project.eu\/fr\/wp-json\/wp\/v2\/pages\/2827\/revisions"}],"predecessor-version":[{"id":2862,"href":"https:\/\/harpocrates-project.eu\/fr\/wp-json\/wp\/v2\/pages\/2827\/revisions\/2862"}],"wp:attachment":[{"href":"https:\/\/harpocrates-project.eu\/fr\/wp-json\/wp\/v2\/media?parent=2827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}