共 57 条
- [1] Deep Learning with Differential Privacy [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
- [2] Practical Secure Aggregation for Privacy-Preserving Machine Learning [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1175 - 1191
- [3] Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
- [4] Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 868 - 886
- [5] Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization [J]. 2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, : 589 - 599
- [6] Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1518 - 1529
- [7] Chenoweth JM, 2016, FLA MUS NAT HIST-RIP, P1
- [8] Coron JS, 2012, LECT NOTES COMPUT SC, V7237, P446, DOI 10.1007/978-3-642-29011-4_27
- [9] Damgård I, 2001, LECT NOTES COMPUT SC, V1992, P119
- [10] Dong Xin Luna, 2009, Proceedings of the VLDB Endowment, V2