Data-Oblivious ML Accelerators using Hardware Security Extensions.
Hossam ElAtaliJohn Z. JekelLachlan J. GunnN. AsokanPublished in: CoRR (2024)
Keyphrases
- data processing
- data sets
- data points
- data collection
- original data
- database
- training data
- data structure
- data analysis
- computing systems
- input data
- synthetic data
- data integrity
- computing power
- raw data
- high dimensional data
- image data
- data acquisition
- data quality
- hardware and software
- data mining techniques
- real time