-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
1c3ab82
commit d3a9334
Showing
12 changed files
with
457 additions
and
26 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,66 @@ | ||
<!DOCTYPE html> | ||
<html> | ||
<head> | ||
<meta charset="UTF-8"> | ||
<meta name="viewport" content="width=device-width, initial-scale=1.0"> | ||
<meta http-equiv="X-UA-Compatible" content="ie=edge"> | ||
<title>Markmap</title> | ||
<style> | ||
* { | ||
margin: 0; | ||
padding: 0; | ||
} | ||
#mindmap { | ||
display: block; | ||
width: 100vw; | ||
height: 100vh; | ||
} | ||
</style> | ||
<link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/[email protected]/dist/katex.min.css"><link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/[email protected]/dist/style.css"> | ||
</head> | ||
<body> | ||
<svg id="mindmap"></svg> | ||
<script src="https://cdn.jsdelivr.net/npm/[email protected]/dist/d3.min.js"></script><script src="https://cdn.jsdelivr.net/npm/[email protected]/dist/browser/index.js"></script><script>((getMarkmap) => { | ||
window.WebFontConfig = { | ||
custom: { | ||
families: [ | ||
"KaTeX_AMS", | ||
"KaTeX_Caligraphic:n4,n7", | ||
"KaTeX_Fraktur:n4,n7", | ||
"KaTeX_Main:n4,n7,i4,i7", | ||
"KaTeX_Math:i4,i7", | ||
"KaTeX_Script", | ||
"KaTeX_SansSerif:n4,n7,i4", | ||
"KaTeX_Size1", | ||
"KaTeX_Size2", | ||
"KaTeX_Size3", | ||
"KaTeX_Size4", | ||
"KaTeX_Typewriter" | ||
] | ||
}, | ||
active: () => { | ||
getMarkmap().refreshHook.call(); | ||
} | ||
}; | ||
})(() => window.markmap)</script><script src="https://cdn.jsdelivr.net/npm/[email protected]/webfontloader.js" defer></script><script src="https://cdn.jsdelivr.net/npm/[email protected]/dist/index.js"></script><script>(r => { | ||
setTimeout(r); | ||
})(() => { | ||
const { | ||
markmap, | ||
mm | ||
} = window; | ||
const { | ||
el | ||
} = markmap.Toolbar.create(mm); | ||
el.setAttribute('style', 'position:absolute;bottom:20px;right:20px'); | ||
document.body.append(el); | ||
})</script><script>((getMarkmap, getOptions, root2, jsonOptions) => { | ||
const markmap = getMarkmap(); | ||
window.mm = markmap.Markmap.create( | ||
"svg#mindmap", | ||
(getOptions || markmap.deriveOptions)(jsonOptions), | ||
root2 | ||
); | ||
})(() => window.markmap,null,{"content":"WIP - Outline of {title-ref}<code>xu2021privacy</code>","children":[{"content":"Privacy Preserving {P}hase in PPML","children":[{"content":"Model Generation","children":[],"payload":{"lines":"13,14"}},{"content":"Model Serving","children":[],"payload":{"lines":"19,20"}},{"content":"Full Pipeline","children":[],"payload":{"lines":"26,27"}}],"payload":{"lines":"5,6"}},{"content":"Privacy {G}uarantees in PPML","children":[{"content":"Object-Oriented Privacy Guarantee","children":[{"content":"Data Oriented","children":[],"payload":{"lines":"33,34"}},{"content":"Model Oriented","children":[],"payload":{"lines":"37,38"}}],"payload":{"lines":"32,33"}},{"content":"Pipeline-Orientied Privacy Guarantee","children":[{"content":"Model Generation Phase","children":[{"content":"Vanilla Local Privacy Guarantee","children":[],"payload":{"lines":"52,53"}},{"content":"Primary Local Privacy Guarantee","children":[],"payload":{"lines":"55,56"}},{"content":"Enhanced Local Privacy Guarantee","children":[],"payload":{"lines":"58,59"}}],"payload":{"lines":"46,47"}},{"content":"Model Serving Phase","children":[{"content":"Typical types of privacy leakage","children":[{"content":"Disclosure of Membership","children":[],"payload":{"lines":"64,65"}},{"content":"Class Representative","children":[],"payload":{"lines":"65,66"}},{"content":"Property","children":[],"payload":{"lines":"66,68"}}],"payload":{"lines":"63,64"}},{"content":"Global Model Privacy Guarantee","children":[],"payload":{"lines":"74,75"}}],"payload":{"lines":"61,62"}},{"content":"Full Privacy Guarantee","children":[],"payload":{"lines":"79,80"}}],"payload":{"lines":"40,41"}}],"payload":{"lines":"30,31"}},{"content":"Technical {U}tility in PPML","children":[{"content":"Data Publish Approach","children":[{"content":"Elimitation-based Approach","children":[{"content":"<span class=\"katex\"><span class=\"katex-mathml\"><math xmlns=\"http://www.w3.org/1998/Math/MathML\"><semantics><mrow><mi>k</mi></mrow><annotation encoding=\"application/x-tex\">k</annotation></semantics></math></span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"strut\" style=\"height:0.69444em;vertical-align:0em;\"></span><span class=\"mord mathnormal\" style=\"margin-right:0.03148em;\">k</span></span></span></span>-anonymity","children":[],"payload":{"lines":"106,107"}},{"content":"<span class=\"katex\"><span class=\"katex-mathml\"><math xmlns=\"http://www.w3.org/1998/Math/MathML\"><semantics><mrow><mi>l</mi></mrow><annotation encoding=\"application/x-tex\">l</annotation></semantics></math></span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"strut\" style=\"height:0.69444em;vertical-align:0em;\"></span><span class=\"mord mathnormal\" style=\"margin-right:0.01968em;\">l</span></span></span></span>-diversity","children":[],"payload":{"lines":"107,108"}},{"content":"<span class=\"katex\"><span class=\"katex-mathml\"><math xmlns=\"http://www.w3.org/1998/Math/MathML\"><semantics><mrow><mi>t</mi></mrow><annotation encoding=\"application/x-tex\">t</annotation></semantics></math></span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"strut\" style=\"height:0.61508em;vertical-align:0em;\"></span><span class=\"mord mathnormal\">t</span></span></span></span>-closeness","children":[],"payload":{"lines":"108,110"}}],"payload":{"lines":"102,103"}},{"content":"Perturbation-based Approach","children":[{"content":"Differential Privacy","children":[],"payload":{"lines":"111,112"}},{"content":"Sketching","children":[],"payload":{"lines":"112,114"}}],"payload":{"lines":"110,111"}},{"content":"Confusion-based Approach (Cryptography)","children":[{"content":"Symmetric encryption (e.g. AES) + Garbled circuits / Oblivious transfer","children":[],"payload":{"lines":"115,116"}},{"content":"Homomorphic encryption","children":[],"payload":{"lines":"116,117"}},{"content":"Functional encryption","children":[],"payload":{"lines":"117,119"}}],"payload":{"lines":"114,115"}}],"payload":{"lines":"100,101"}},{"content":"Data Processing Approach","children":[{"content":"Ordinary Computation","children":[{"content":"Elimination-based Approach","children":[],"payload":{"lines":"124,125"}},{"content":"Perturbation-based Approach","children":[],"payload":{"lines":"125,126"}}],"payload":{"lines":"121,122"}},{"content":"Secure Computation","children":[{"content":"Additive Mask based Approach","children":[{"content":"Pairwise Additive Masking Based Secure Computation Approach","children":[{"content":"<span class=\"katex\"><span class=\"katex-mathml\"><math xmlns=\"http://www.w3.org/1998/Math/MathML\"><semantics><mrow><mi>t</mi></mrow><annotation encoding=\"application/x-tex\">t</annotation></semantics></math></span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"strut\" style=\"height:0.61508em;vertical-align:0em;\"></span><span class=\"mord mathnormal\">t</span></span></span></span>-of-<span class=\"katex\"><span class=\"katex-mathml\"><math xmlns=\"http://www.w3.org/1998/Math/MathML\"><semantics><mrow><mi>n</mi></mrow><annotation encoding=\"application/x-tex\">n</annotation></semantics></math></span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"strut\" style=\"height:0.43056em;vertical-align:0em;\"></span><span class=\"mord mathnormal\">n</span></span></span></span> secret sharing","children":[],"payload":{"lines":"136,137"}},{"content":"Multi-Secret Sharing","children":[],"payload":{"lines":"137,138"}}],"payload":{"lines":"135,138"}},{"content":"Double Masking Pairwise Based Protocol","children":[{"content":"Prevents the failure happened in Pairwise Additive Masking","children":[],"payload":{"lines":"139,140"}}],"payload":{"lines":"138,140"}},{"content":"Anonymous Communication","children":[{"content":"DC-nets (Dining Cryptographers Networks)","children":[],"payload":{"lines":"141,142"}},{"content":"mix-nets","children":[],"payload":{"lines":"142,145"}}],"payload":{"lines":"140,145"}}],"payload":{"lines":"131,132"}},{"content":"Garbled Circuit based Approach","children":[],"payload":{"lines":"145,146"}},{"content":"Advanced Cryptography based Approach","children":[{"content":"Homomorphic Encryption","children":[],"payload":{"lines":"148,149"}},{"content":"Functional Encryption","children":[],"payload":{"lines":"149,150"}}],"payload":{"lines":"147,148"}},{"content":"Mixed Protocol Approach","children":[{"content":"TASTY","children":[],"payload":{"lines":"154,155"}},{"content":"ABY","children":[],"payload":{"lines":"155,156"}},{"content":"ABY<span class=\"katex\"><span class=\"katex-mathml\"><math xmlns=\"http://www.w3.org/1998/Math/MathML\"><semantics><mrow><msup><mrow></mrow><mn>3</mn></msup></mrow><annotation encoding=\"application/x-tex\">^3</annotation></semantics></math></span><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"strut\" style=\"height:0.8141079999999999em;vertical-align:0em;\"></span><span class=\"mord\"><span></span><span class=\"msupsub\"><span class=\"vlist-t\"><span class=\"vlist-r\"><span class=\"vlist\" style=\"height:0.8141079999999999em;\"><span style=\"top:-3.063em;margin-right:0.05em;\"><span class=\"pstrut\" style=\"height:2.7em;\"></span><span class=\"sizing reset-size6 size3 mtight\"><span class=\"mord mtight\">3</span></span></span></span></span></span></span></span></span></span></span>","children":[],"payload":{"lines":"156,157"}},{"content":"CrypTen","children":[],"payload":{"lines":"157,158"}},{"content":"Falcon","children":[],"payload":{"lines":"158,160"}}],"payload":{"lines":"151,152"}},{"content":"Trusted Execution Environment Approach","children":[{"content":"Code Authentication","children":[],"payload":{"lines":"161,162"}},{"content":"Runtime State Integrity","children":[],"payload":{"lines":"162,163"}},{"content":"Confidentiality","children":[],"payload":{"lines":"163,165"}}],"payload":{"lines":"160,161"}}],"payload":{"lines":"127,128"}}],"payload":{"lines":"119,120"}},{"content":"Architectureal Appraoch","children":[{"content":"Delegation-based ML Architecture","children":[{"content":"CryptoML","children":[],"payload":{"lines":"169,170"}},{"content":"SecureML","children":[],"payload":{"lines":"170,172"}}],"payload":{"lines":"167,168"}},{"content":"Distributed Selective SGD Architecture","children":[],"payload":{"lines":"172,173"}},{"content":"Federated Learning Architecture","children":[],"payload":{"lines":"174,175"}},{"content":"Knowledge Transfer Architecture","children":[{"content":"Knowledge Distillation","children":[],"payload":{"lines":"178,179"}},{"content":"Model Compression","children":[],"payload":{"lines":"179,180"}},{"content":"Transfer Learning","children":[],"payload":{"lines":"180,182"}}],"payload":{"lines":"176,177"}}],"payload":{"lines":"165,166"}},{"content":"Hybrid Approach","children":[],"payload":{"lines":"182,183"}}],"payload":{"lines":"83,84"}}],"payload":{"lines":"0,1"}},{})</script> | ||
</body> | ||
</html> |
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.