共 32 条
[1]
Avent B, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P747
[2]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[3]
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[4]
Fan Mo, 2021, MobiSys '21: Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, P94, DOI 10.1145/3458864.3466628
[5]
Geyer Robin C., DIFFERENTIALLY PRIVA
[7]
Introduction and Preliminaries
[J].
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE,
2005, 1 (01)
:1-124
[8]
Goldreich Oded., 2009, FDN CRYPTOGRAPHY, V2
[9]
Hard A, 2019, Arxiv, DOI [arXiv:1811.03604, 10.48550/ARXIV.1811.03604]
[10]
Deep Residual Learning for Image Recognition
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:770-778