Abstract
Various companies and researchers invest significant material and time resources to collect the necessary datasets, and as a consequence, wish to keep them secret. To analyze the collected datasets and further apply them in the training of neural networks for specific tasks requires the appropriate hardware, which not all machine learning researchers are able to acquire. To solve this problem, many IT corporations, such as Amazon or Google, provide access to their powerful hardware infrastructure (on a reimbursable and non-reimbursable basis) with high computing power for training neural networks. The semantics of the datasets on which the training of neural networks will take place is open. Therefore, there is a need to protect the semantics of the data on which neural networks will be trained in the cloud services or on remote computers
Publisher
Bauman Moscow State Technical University
Reference15 articles.
1. Google colaboratory: website. Available at: https://colab.research.google.com (accessed: 15.09.2021).
2. Gentry C. Fully homomorphic encryption using ideal lattices. Proc. STOC, 2009, pp. 169--178. DOI: https://doi.org/10.1145/1536414.1536440
3. Salomaa A. Public-key cryptography. New York, Springer, 1990.
4. Arute F., Arya K., Babbush R., et al. Quantum supremacy using a programmable superconducting processor. Nature, 2019, vol. 574, pp. 505--510. DOI: https://doi.org/10.1038/s41586-019-1666-5
5. Goodfellow I., Pouget-Abadie J., Mirza M., et al. Generative adversarial networks. Proc. NIPS, 2014, pp. 2672--2680.