共 28 条
[1]
Acs Gergely, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P118, DOI 10.1007/978-3-642-24178-9_9
[2]
Bonawitz K, 2016, arXiv, DOI [10.48550/arXiv.1611.04482, DOI 10.48550/ARXIV.1611.04482]
[3]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[4]
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:1068-1079
[6]
Geiping J., 2020, P 34 C NEUR INF PROC
[7]
Geyer R.C., 2017, P NIPS 2017 WORKSH M
[10]
Halevi S, 2011, LECT NOTES COMPUT SC, V6841, P132, DOI 10.1007/978-3-642-22792-9_8