共 20 条
- [1] Liu Junxu, Meng Xiaofeng, Survey on privacy-preserving machinelearning, Journal of Computer Research and Development, 57, 2, pp. 346-362, (2020)
- [2] Song Lei, Ma Chunguang, Duan Guanghan, Machine learning security and privacy: A survey, Chinese Journal of Network and Information Security, 4, 8, pp. 5-15, (2018)
- [3] Li Pan, Zhao Wentao, Liu Qiang, Et al., Security issues and their counter measuring techniques of machine learning: A survey, Journal of Frontiers of Computer Science and Technology, 12, 2, pp. 171-184, (2018)
- [4] Lindell Y, Pinkas B., Privacy preserving data mining, Proc of Annual Int Cryptology Conf, pp. 36-54, (2000)
- [5] Jiang Han, Xu Qiuliang, Advances in key techniques of practical secure multi-party computation, Journal of Computer Research and Development, 52, 10, pp. 2247-2257, (2015)
- [6] Mohassel P, SecMohassel P, Zhang Yupeng, SecureML: A system for scalable privacy-preserving machine learning, Proc of 2017 IEEE Symp on Security and Privacy (SP), pp. 19-38, (2017)
- [7] Demmler D, Schneider T, Zohner M., ABY-A framework for efficient mixed-protocol secure two-party computation, Proc of Network and Distributed System Security Symp, pp. 1-15, (2015)
- [8] Mohassel P, Rindal P., ABY3: A mixed protocol framework for machine learning, Proc of the 2018 ACM SIGSAC Conf on Computer and Communications Security, pp. 35-52, (2018)
- [9] Chaudhari H, Choudhury A, Patra A, Et al., ASTRA: High throughput 3PC over rings with application to secure prediction, Proc of the 2019 ACM SIGSAC Conf on Cloud Computing Security Workshop, pp. 81-92, (2019)
- [10] Patra A, Suresh A., BLAZE: Blazing fast privacy-Preserving machine learning[J/OL], (2020)