ARCHIVES
Original Article
Cryptographically Protected Model-As-A-Service with Zero- Exposure Inference Using Homomorphic Computation
C. Manishabharathi1
S. Surendhar2
S. Praveenkumar3
S. Ezhilarasan4
1 Assistant Professor, Department of Information Technology, PSV College of Engineering and Technology, Krishnagiri,Tamil Nadu, India. 2 3 4 UG Scholars, Department of Information Technology, PSV College of Engineering and Technology, Krishnagiri, Tamil Nadu, India.
Published Online: January-April 2026
Pages: 355-359
Cite this article
No DOIReferences
1. L. Folkerts, C. Gouert and N. G. Tsoutsos, "REDsec: Running Encrypted Discretized Neural Networks in Seconds", Proceedings of the
Network and Distributed System Security Symposium (NDSS), March 2023.
2. N Carlini, S Chien, M Nasr et al., "Membership inference attacks from first principles[C]", 2022 IEEE Symposium on Security and Privacy
(SP), pp. 1897-1914, 2022.
3. A El Ouadrhiri and A Abdelhadi, "Differential privacy for deep and federated learning: A survey[J]", IEEE access, vol. 10, pp. 22359-22380,
2022.
4. C A Choquette-Choo, F Tramer, N Carlini et al., "Label-only membership inference attacks[C]", International conference on machine
learning, pp. 1964-1974, 2021.
5. A. Kumar, R. S. Raj, P. Yadav, and M. Singh, "Blockchain-based secure model deployment in AI as a Service system," Journal of
Cryptographic Engineering, vol. 15, no. 2, pp. 125-142, 2024
Network and Distributed System Security Symposium (NDSS), March 2023.
2. N Carlini, S Chien, M Nasr et al., "Membership inference attacks from first principles[C]", 2022 IEEE Symposium on Security and Privacy
(SP), pp. 1897-1914, 2022.
3. A El Ouadrhiri and A Abdelhadi, "Differential privacy for deep and federated learning: A survey[J]", IEEE access, vol. 10, pp. 22359-22380,
2022.
4. C A Choquette-Choo, F Tramer, N Carlini et al., "Label-only membership inference attacks[C]", International conference on machine
learning, pp. 1964-1974, 2021.
5. A. Kumar, R. S. Raj, P. Yadav, and M. Singh, "Blockchain-based secure model deployment in AI as a Service system," Journal of
Cryptographic Engineering, vol. 15, no. 2, pp. 125-142, 2024
Related Articles
2026
Artificial Intelligence in Learning and Teaching
2026
Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application
2026
Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach
2026
Eco-Genius: Power Up Smart, Power Down Waste
2026
Crowd-Sourced Disaster Response and Rescue Assistant
2026
Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study
Share Article
Or copy link
https://test.indjcst.com/archives/cryptographically-protected-model-as-a-service-with-zero-exposure-inference-using-homomorphic-computation
*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.