Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/123456789/29245
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBabenko, M. G.-
dc.contributor.authorБабенко, М. Г.-
dc.date.accessioned2024-11-27T11:17:18Z-
dc.date.available2024-11-27T11:17:18Z-
dc.date.issued2024-
dc.identifier.citationPulido-Gaytan B., Tchemykh A., Babenko M., Cortes-Mendoza J.M., Gonzalez-Velez H., Avetisyan A. Enhancing Cloud Security through Efficient Polynomial Approximations for Homomorphic Evaluation of Neural Network Activation Functions // Proceedings - 2024 IEEE/ACM 24th International Symposium on Cluster, Cloud and Internet Computing Workshops, CCGridW 2024. - 2024. - pp. 42 - 49., -DOI: 10.1109/CCGridW63211.2024.00011ru
dc.identifier.urihttps://dspace.ncfu.ru/handle/123456789/29245-
dc.description.abstractCurrent security cloud practices can successfully protect stored data and data in transit, but they do not keep the same protection during data processing. The data value extraction requires decryption, creating critical exposure points. As a result, privacy-preserving techniques are emerging as a crucial consideration in cloud computing. The homomorphic processing of machine learning models in the cloud represents a central challenge. The activation function is fundamental in constructing a privacy-preserving Neural Network (NN) with Homomorphic Encryption (HE). Standard activation functions require operations not supported by HE, so it is necessary to find cryptographically compatible replacement functions to operate over encrypted data. Multiple approaches address the limitation of function compatibility with polynomial approximation. These functions should exhibit a trade-off between complexity and accuracy, limiting the efficiency of conventional approximation techniques. The current literature on polynomial approximation of NN activation functions still lacks a thorough review. In this paper, we comprehensively review the standard activation functions of modern NN models and current polynomial approximation approaches. We highlight fundamental features to consider in the activation function and the approximation technique to operate over encrypted data.ru
dc.language.isoenru
dc.publisherInstitute of Electrical and Electronics Engineers Inc.ru
dc.relation.ispartofseriesProceedings - 2024 IEEE/ACM 24th International Symposium on Cluster, Cloud and Internet Computing Workshops, CCGridW 2024-
dc.subjectCloud securityru
dc.subjectPrivacy-preservingru
dc.subjectHomomorphic encryptionru
dc.subjectNeural networksru
dc.subjectPolynomial approximationru
dc.titleEnhancing Cloud Security through Efficient Polynomial Approximations for Homomorphic Evaluation of Neural Network Activation Functionsru
dc.typeСтатьяru
vkr.instФакультет математики и компьютерных наук имени профессора Н.И. Червяковаru
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 3266.pdf
  Restricted Access
130.58 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.