共 65 条
[1]
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[3]
Agarap A. F., 2018, arXiv, DOI DOI 10.48550/ARXIV.1803.08375
[4]
QUOTIENT: Two-Party Secure Neural Network Training and Prediction
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:1231-1247
[5]
[Anonymous], 2020, NEXT GENERATION DATA
[6]
[Anonymous], 2020, JAN PRI DAT SERV
[7]
[Anonymous], 2020, TRANSF TRUST
[9]
Bell Nathan., 2008, EFFICIENT SPARSE MAT
[10]
Bishop CM., 2006, Pattern Recognition and Machine Learning