共 90 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[2]
Agarwal R, 2016, 2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P70, DOI 10.1109/WF-IoT.2016.7845470
[3]
Al-Qaseemi SA, 2016, PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC), P731, DOI 10.1109/FTC.2016.7821686
[4]
[Anonymous], 2017, P PRIV ENH TECHN 201
[5]
[Anonymous], P 2018 55 ACM ESDA I
[6]
[Anonymous], 2016, Proceedings of the 15th International Conference on Information Processing in Sensor Networks
[7]
[Anonymous], 2010, Proceedings of 11th IEEE International Workshop on Signal ProcessingAdvances in Wireless Communications (SPAWC), Marrakech
[8]
Scalable and Secure Logistic Regression via Homomorphic Encryption
[J].
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY,
2016,
:142-144
[10]
Audich DhirenA., 2018, IFIP Adv. Inf. Commun. Technol, P29, DOI DOI 10.1007/978-3-319-95276-5_3