共 99 条
[2]
Aggarwal K., 2022, Iraqi Journal For Computer Science and Mathematics, V3, P115, DOI [DOI 10.52866/IJCSM.2022, DOI 10.52866/IJCSM.2022.01]
[3]
Albrecht J., 2016, Eur Data Prot L Rev, V2, P287, DOI DOI 10.21552/EDPL/2016/3/4
[5]
Bell J., 2022, MACHINE LEARNING CIT, P207, DOI [10.1002/9781119815075.ch18, DOI 10.1002/9781119815075.CH18]
[6]
Benaloh JC, 2000, ADV CRYPTOLOGY CRYPT, P251
[7]
Boenisch F, 2021, Arxiv, DOI [arXiv:2105.07985, 10.1016/j.eswa.2014.09.054]
[8]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[9]
Bonawitz Keith, 2016, arXiv, DOI DOI 10.48550/ARXIV.1611.04482
[10]
Booher DD, 2019, 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P482, DOI 10.1109/CCWC.2019.8666500