共 61 条
[11]
Dua D., 2017, UCI MACHINE LEARNING
[12]
Dwork Cynthia., 2011, ENCY CRYPTOGRAPHY SE, P338, DOI [10.1007/11787006, 10.1007/978-1-4419-5906-5752, DOI 10.1007/978-1-4419-5906-5752]
[14]
Ferrie F. P., 2012, P AS C MACH LEARN, P1
[16]
Goldreich Oded., 1987, STOC, P218, DOI [10.1145/28395. 28420, DOI 10.1145/28395.28420]
[17]
Gordon SD, 2018, LECT NOTES COMPUT SC, V11274, P59, DOI 10.1007/978-3-030-03332-3_3
[19]
Hastie Trevor., 2009, The elements of statistical learning, V2, DOI DOI 10.1007/978-0-387-84858-7
[20]
Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1389-1406