B-LNN: Inference-time linear model for secure neural network inference

被引:3
|
作者
Wang, Qizheng [1 ,2 ]
Ma, Wenping [1 ]
Wang, Weiwei [1 ]
机构
[1] Xidian Univ, Sch Commun Engn, Xian, Peoples R China
[2] Shandong Inspur Sci Res Inst Co Ltd, Jinan, Peoples R China
关键词
Neural networks; Activation function; Privacy protection; Secure neural network inference;
D O I
10.1016/j.ins.2023.118966
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Learning as a Service (MLaaS) provides clients with well-trained neural networks for predicting private data. Conventional prediction processes of MLaaS require clients to send sensitive inputs to the server, or proprietary models must be stored on the client-side device. The former reveals client privacy, while the latter harms the interests of model providers. Existing works on privacy-preserving MLaaS introduce cryptographic primitives to allow two parties to perform neural network inference without revealing either party's data. However, nonlinear activation functions bring high computational overhead and response delays to the inference process of these schemes.In this paper, we analyze the mechanism by which activation functions enhance model expressivity, and design an activation function S -cos that is friendly to secure neural network inference. Our proposed S -cos can be re-parameterized into a linear layer during the inference phase. Further, we propose an inference-time linear model called Beyond Linear Neural Network (B-LNN) equipped with S -cos, which exhibits promising performance on several benchmark datasets.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Backpropagation neural network model with statistical inference in manufacturing processes
    de Leon-Delgado, Homero
    Praga-Alejo, Rolando J.
    Gonzalez-Gonzalez, David S.
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2025, 44
  • [42] Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead
    Mann, Zoltan Adam
    Weinert, Christian
    Chabal, Daphnee
    Bos, Joppe W.
    ACM COMPUTING SURVEYS, 2024, 56 (05)
  • [43] Quantum-aided secure deep neural network inference on real quantum computers
    Hanqiao Yu
    Xuebin Ren
    Cong Zhao
    Shusen Yang
    Julie McCann
    Scientific Reports, 13
  • [44] Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference
    Huang, Zhicong
    Lu, Wen-Jie
    Hong, Cheng
    Ding, Jiansheng
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 809 - 826
  • [45] Quantum-aided secure deep neural network inference on real quantum computers
    Yu, Hanqiao
    Ren, Xuebin
    Zhao, Cong
    Yang, Shusen
    McCann, Julie
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [46] HELiKs: HE Linear Algebra Kernels for Secure Inference
    Balla, Shashank
    Koushanfar, Farinaz
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2306 - 2320
  • [47] A JIT Compiler for Neural Network Inference
    Thielke, Felix
    Hasselbring, Arne
    ROBOT WORLD CUP XXIII, ROBOCUP 2019, 2019, 11531 : 448 - 456
  • [48] Depth Inference with Convolutional Neural Network
    Tian, Hu
    Zhuang, Bojin
    Hua, Yan
    Cai, Anni
    2014 IEEE VISUAL COMMUNICATIONS AND IMAGE PROCESSING CONFERENCE, 2014, : 169 - 172
  • [49] Neural Network Inference on Mobile SoCs
    Wang, Siqi
    Pathania, Anuj
    Mitra, Tulika
    IEEE DESIGN & TEST, 2020, 37 (05) : 50 - 57
  • [50] Adaptive fuzzy inference neural network
    Iyatomi, H
    Hagiwara, M
    PATTERN RECOGNITION, 2004, 37 (10) : 2049 - 2057