共 57 条
- [2] Blanton M., 2012, P 7 ACM S INF COMP C, P40
- [3] Buddhavarapu P., 2020, Cryptology ePrint Archive, Report 2020/599
- [4] A genetic algorithm for multivariate missing data imputation [J]. INFORMATION SCIENCES, 2023, 619 : 947 - 967
- [5] Chase Melissa, 2020, Advances in Cryptology - ASIACRYPT 2020. 26th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings. Lecture Notes in Computer Science (LNCS 12393), P342, DOI 10.1007/978-3-030-64840-4_12
- [6] Labeled PSI from Fully Homomorphic Encryption with Malicious Security [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1223 - 1237
- [7] Good practice in Bayesian network modelling [J]. ENVIRONMENTAL MODELLING & SOFTWARE, 2012, 37 : 134 - 145
- [8] XGBoost: A Scalable Tree Boosting System [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 785 - 794
- [9] Private Set Operations from Multi-query Reverse Private Membership Test [J]. PUBLIC-KEY CRYPTOGRAPHY, PT III, PKC 2024, 2024, 14603 : 387 - 416
- [10] Chourasia Rishav, P MACHINE LEARNING R