共 18 条
[1]
archive.ics.uci.edu, UCI Machine Learning Repository
[2]
Bellare Mihir., 2012, the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012, P784, DOI [10.1145/2382196.2382279, DOI 10.1145/2382196.2382279]
[3]
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[4]
Ding B., 2018, Proc. AAAI, V32
[5]
Local Privacy and Statistical Minimax Rates
[J].
2013 IEEE 54TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS),
2013,
:429-438
[6]
Dwork Cynthia., 2011, ENCY CRYPTOGRAPHY SE, P338
[7]
Gaboardi Marco., 2018, INT C MACH LEARN, P1626
[8]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[10]
Kairouz P, 2014, ADV NEUR IN, V27