共 27 条
[1]
Ahmadi Mojtaba, 2024, 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC), P1, DOI 10.1109/ICAIC60265.2024.10433831
[2]
Beutel D. J., 2020, arXiv
[3]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[4]
Choi SG, 2013, LECT NOTES COMPUT SC, V7785, P499, DOI 10.1007/978-3-642-36594-2_28
[5]
Damgard Ivan, 2002, Lecture Notes, P84
[6]
Fisher, 1936, UCI MACHINE LEARNING
[7]
Gennaro R, 2013, LECT NOTES COMPUT SC, V7881, P626, DOI 10.1007/978-3-642-38348-9_37
[8]
Ghodsi Z., 2017, P INT C NEUR INF PRO, P4675, DOI DOI 10.5555/3294996.3295220
[9]
On the Size of Pairing-Based Non-interactive Arguments
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II,
2016, 9666
:305-326
[10]
Guo Jinxi, 2020, CoRR abs/2012.12700