共 20 条
[1]
Fast Multi-dimensional Range Queries on Encrypted Cloud Databases
[J].
DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2017), PT I,
2017, 10177
:559-575
[2]
Dwork C., 2013, The Algorithmic Foundations of Differential Privacy, DOI DOI 10.1561/9781601988195
[3]
Dwork C., 2006, Automata, Languages and Programming, P1, DOI DOI 10.1007/117870061
[4]
Differential privacy: A survey of results
[J].
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS,
2008, 4978
:1-19
[5]
Geyer R.C., 2017, arXiv
[7]
Deep Residual Learning for Image Recognition
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:770-778
[8]
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:603-618
[9]
FedMP: Federated Learning through Adaptive Model Pruning in Heterogeneous Edge Computing
[J].
2022 IEEE 38TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2022),
2022,
:767-779
[10]
Krizhevsky A., 2009, The cifar-10 dataset