共 47 条
[1]
Acs Gergely, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P118, DOI 10.1007/978-3-642-24178-9_9
[2]
Ateniese Giuseppe, 2015, International Journal of Security and Networks, V10, P137, DOI 10.1504/ijsn.2015.071829
[3]
Baracaldo Nathalie, 2022, Federated Learning: A Comprehensive Overview of Methods and Applications, P281
[4]
Beaver D, 1999, NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, P92
[5]
Beaver Donald., 1997, STOC, V97, P446, DOI [DOI 10.1145/258533.258637, 10.1145/258533.258637]
[6]
Secure Single-Server Aggregation with (Poly)Logarithmic Overhead
[J].
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2020,
:1253-1269
[7]
Belorgey Mariya Georgieva, 2023, WAHC, P11, DOI [10.1145/3605759.3625261, DOI 10.1145/3605759.3625261]
[8]
Ben-Itzhak Y., 2023, ScionFL: Efficient and Robust Secure Quantized Aggregation
[9]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[10]
Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
[J].
INFORMATION SECURITY AND PRIVACY, ACISP 2021,
2021, 13083
:510-528