Keyphrases
Activation Map
21%
Actual Application
10%
As-a-service
10%
Client Data
14%
Computing Power
10%
Data Privacy
14%
Data Scientist
10%
End Device
21%
Feature Space
42%
Finance Research
10%
Financial Data
10%
Fully Homomorphic Encryption
42%
Function Secret Sharing
28%
Gap Current
10%
Hacker Attacks
42%
Health Records
10%
High Computational Cost
10%
Hijack
42%
Homomorphic Encryption
42%
Machine Learning
77%
Machine Learning Framework
10%
Machine Learning Inference
10%
Machine Learning Models
42%
Machine Learning Service
42%
Machine Learning Techniques
17%
Machine Learning Training
10%
Medical Research
10%
Multiple Disciplines
10%
Neural Network Training
42%
Open Science
10%
Privacy Concerns
10%
Privacy-preserving
42%
Privacy-preserving Machine Learning
84%
Privacy-preserving Techniques
10%
Private Information
10%
Protected Data
10%
Raising Awareness
10%
Real-world Application
10%
Realistic Scenario
10%
Recent Advances
10%
Reproducible Research
42%
Secure multi-party Computation
21%
Social Science Research
10%
Split Learning
42%
Systemization of Knowledge
10%
Theoretical Advancement
10%
Theoretical Research
10%
Training Model
21%
Unique Properties
10%
User Data Privacy
10%
Computer Science
Building-Blocks
5%
Collaborative Learning
10%
Communication Cost
5%
Communication Overhead
10%
Computation Cost
5%
Computational Cost
5%
Computing Power
5%
Data Privacy
26%
Data Scientist
5%
Data-Client
10%
Encrypted Data
5%
External Server
5%
Feature Map
31%
Feature Space
42%
Financial Data
5%
Hijacking Attack
42%
Homomorphic Encryption
52%
homomorphic-encryption
5%
Hybrid Approach
10%
Input Information
10%
Learning Framework
5%
Learning Process
10%
Learning System
100%
Learning Technique
10%
Machine Learning
100%
Machine Learning Scheme
5%
Malicious Attack
5%
Neural Network Training
42%
Open Source
5%
Plaintext Data
5%
Privacy Leakage
10%
Privacy Preserving
42%
Privacy Preserving Machine Learning
63%
Privacy-Preserving Technique
5%
Reproducibility
5%
Secret Sharing
42%
secure multiparty computation
10%
Security and Privacy
5%
Sensitive Informations
10%
Symmetric Cryptography
5%
Theoretical Background
5%
Theoretical Research
5%
Training Model
5%
Training Phase
5%
Unique Property
5%
User Data
5%
Utmost Importance
5%
Widespread Adoption
5%
World Application
5%