Machine Learning with Confidential Computing: A Systematization of Knowledge
Abstract
References
Index Terms
- Machine Learning with Confidential Computing: A Systematization of Knowledge
Recommendations
Learning with differential privacy: stability, learnability and the sufficiency and necessity of ERM principle
While machine learning has proven to be a powerful data-driven solution to many real-life problems, its use in sensitive domains has been limited due to privacy concerns. A popular approach known as differential privacy offers provable privacy guarantees,...
Confidential computing for OpenPOWER
EuroSys '21: Proceedings of the Sixteenth European Conference on Computer SystemsThis paper presents Protected Execution Facility (PEF), a virtual machine-based Trusted Execution Environment (TEE) for confidential computing on Power ISA. PEF enables protected secure virtual machines (SVMs). Like other TEEs, PEF verifies the SVM prior ...
Fairness Audit of Machine Learning Models with Confidential Computing
WWW '22: Proceedings of the ACM Web Conference 2022Algorithmic discrimination is one of the significant concerns in applying machine learning models to a real-world system. Many researchers have focused on developing fair machine learning algorithms without discrimination based on legally protected ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Survey
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 1,198Total Downloads
- Downloads (Last 12 months)1,198
- Downloads (Last 6 weeks)158
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in