Table 1: Accuracy of model after application of our PEOLE method with (p,s) = (80%, 10
−2
) depending on precision on
both w
i
and f e.
precision on w
i
10
2
10
3
10
4
10
5
10
6
10
2
97.5 % 97.5% 97.5% 97.5% 97.5%
10
3
97.5625 % 97.5625% 97.5625% 97.5625% 97.5625%
10
4
97.5625 % 97.5625% 97.5625% 97.5625% 97.5625%
10
5
97.5625 % 97.5625% 97.5625% 97.5625% 97.5625%
precision
on f e
10
5
97.5625 % 97.5625% 97.5625% 97.5625% 97.5625%
Table 2: Costs (in seconds) for our architecture, where x = (x
1
,... , x
785
).
User-side Server-side Operator-side
Operation Enc GenTag MLP(Enc(x)) MLP(σ
1
,.. . ,σ
n
) Veri f y Dec
times 36.11 0.005 66.3 1.48 0.027 0.002
national conference on computer vision, pages 2252–
2259. IEEE.
Baralis, E., Chiusano, S., and Garza, P. (2007). A
lazy approach to associative classification. IEEE
Transactions on Knowledge and Data Engineering,
20(2):156–171.
Blum, A. and Mitchell, T. (1998). Combining labeled and
unlabeled data with co-training. In Proceedings of the
eleventh annual conference on Computational learn-
ing theory, pages 92–100.
Cao, X., Wang, Z., Yan, P., and Li, X. (2013). Transfer
learning for pedestrian detection. Neurocomputing,
100:51–57.
Chollet, F. et al. (2015). Keras. https://github.com/fchollet/
keras.
Fan, J. and Vercauteren, F. (2012). Somewhat practical fully
homomorphic encryption. IACR Cryptology ePrint
Archive, 2012:144.
Fiore, D., Gennaro, R., and Pastro, V. (2014). Efficiently
verifiable computation on encrypted data. In Proceed-
ings of the 2014 ACM SIGSAC Conference on Com-
puter and Communications Security, pages 844–855.
Gao, J., Ling, H., Hu, W., and Xing, J. (2014). Transfer
learning based visual tracking with gaussian processes
regression. In European conference on computer vi-
sion, pages 188–203. Springer.
Ghodsi, Z., Gu, T., and Garg, S. (2017). Safetynets: Ver-
ifiable execution of deep neural networks on an un-
trusted cloud. In Advances in Neural Information Pro-
cessing Systems, pages 4672–4681.
Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K.,
Naehrig, M., and Wernsing, J. (2016). CryptoNets:
Applying neural networks to encrypted data with high
throughput and accuracy. In ICML, pages 201–210.
Hesamifard, E., Takabi, H., and Ghasemi, M. (2019). Deep
neural networks classification over encrypted data. In
ACM CODASPY, page 97–108.
Jie, L., Tommasi, T., and Caputo, B. (2011). Multiclass
transfer learning from unconstrained priors. In 2011
International Conference on Computer Vision, pages
1863–1870. IEEE.
Joachims, T. et al. (1999). Transductive inference for text
classification using support vector machines. In Icml,
volume 99, pages 200–209.
Kuncheva, L. I. and Rodriguez, J. J. (2007). Classi-
fier ensembles with a random linear oracle. IEEE
Transactions on Knowledge and Data Engineering,
19(4):500–508.
Kuzborskij, I., Orabona, F., and Caputo, B. (2013). From
n to n+ 1: Multiclass transfer incremental learning.
In Proceedings of the IEEE Conference on Computer
Vision and Pattern Recognition, pages 3358–3365.
Kuzborskij, I., Orabona, F., and Caputo, B. (2015). Transfer
learning through greedy subset selection. In Interna-
tional Conference on Image Analysis and Processing,
pages 3–14. Springer.
Kuzborskij, I., Orabona, F., and Caputo, B. (2017). Scalable
greedy algorithms for transfer learning. Computer Vi-
sion and Image Understanding, 156:174–185.
Long, M., Wang, J., Ding, G., Sun, J., and Yu, P. S. (2013).
Transfer feature learning with joint distribution adap-
tation. In Proceedings of the IEEE international con-
ference on computer vision, pages 2200–2207.
Lou, Q., Feng, B., Fox, G. C., and Jiang, L. (2019). Glyph:
Fast and accurately training deep neural networks on
encrypted data. arXiv preprint arXiv:1911.07101.
Madi, A., Sirdey, R., and Stan, O. (2020). Computing neural
networks with homomorphic encryption and verifiable
computing. In International Conference on Applied
Cryptography and Network Security, pages 295–317.
Springer.
Mormont, R., Geurts, P., and Mar
´
ee, R. (2018). Com-
parison of deep transfer learning strategies for digital
pathology. In Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition Workshops,
pages 2262–2271.
Nigam, K., McCallum, A. K., Thrun, S., and Mitchell, T.
(2000). Text classification from labeled and unlabeled
documents using em. Machine learning, 39(2):103–
134.
Patricia, N. and Caputo, B. (2014). Learning to learn, from
transfer learning to domain adaptation: A unifying
perspective. In Proceedings of the IEEE Conference
ICISSP 2022 - 8th International Conference on Information Systems Security and Privacy
228