共 45 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[2]
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[3]
Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things
[J].
37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021,
2021,
:119-130
[4]
Secure Single-Server Aggregation with (Poly)Logarithmic Overhead
[J].
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2020,
:1253-1269
[5]
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
[6]
Bhagoji AN, 2019, PR MACH LEARN RES, V97
[7]
Bommasani R., 2021, OPPORTUNITIES RISKS, DOI [10.48550/arXiv.2108.07258, DOI 10.48550/ARXIV.2108.07258]
[8]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[9]
Boneh D, 2013, LECT NOTES COMPUT SC, V8042, P410, DOI 10.1007/978-3-642-40041-4_23
[10]
Caldas S., 2019, LEAF BENCHMARK FEDER