共 30 条
[1]
[Anonymous], 1978, The Belmont Report. Technical Report
[2]
[Anonymous], 2016, Int. & Comp. L. Q., DOI DOI 10.1017/S0020589322000380
[4]
Bonawitz K, 2019, Arxiv, DOI arXiv:1902.01046
[5]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[6]
Christodoulou G, 2011, LECT NOTES COMPUT SC, V6942, P119, DOI 10.1007/978-3-642-23719-5_11
[8]
Faltings Boi, 2017, Game Theory for Data Science: Eliciting Truthful Information
[9]
Gao DS, 2019, IEEE INT CONF BIG DA, P2552, DOI 10.1109/BigData47090.2019.9005992
[10]
Gollapudi S., 2017, ESA