共 43 条
[2]
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P420
[3]
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[4]
Function Secret Sharing
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II,
2015, 9057
:337-367
[6]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145
[9]
Xception: Deep Learning with Depthwise Separable Convolutions
[J].
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017),
2017,
:1800-1807
[10]
Where Do Deep Fakes Look? Synthetic Face Detection via Gaze Tracking
[J].
PROCEEDINGS ETRA 2021: ACM SYMPOSIUM ON EYE TRACKING RESEARCH AND APPLICATIONS,
2021,