共 42 条
[1]
CONTRA: Defending Against Poisoning Attacks in Federated Learning
[J].
COMPUTER SECURITY - ESORICS 2021, PT I,
2021, 12972
:455-475
[2]
Bell J, 2023, PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, P4805
[3]
Bellare M, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P172
[4]
Ben-Itzhak Y, 2024, Arxiv, DOI arXiv:2210.07376
[5]
Blanchard P, 2017, ADV NEUR IN, V30
[6]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[7]
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:395-412
[8]
Efficient Homomorphic Comparison Methods with Optimal Complexity
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2020, PT II,
2020, 12492
:221-256
[9]
Homomorphic Encryption for Arithmetic of Approximate Numbers
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I,
2017, 10624
:409-437
[10]
El Mhamdi El Mahdi, 2018, P MACHINE LEARNING R, V80