共 57 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[2]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[3]
Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
[4]
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2012,
2012, 7417
:868-886
[5]
Leveraging Crowdsensed Data Streams to Discover and Sell Knowledge: A Secure and Efficient Realization
[J].
2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS),
2018,
:589-599
[6]
Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1518-1529
[7]
Chenoweth JM, 2016, FLA MUS NAT HIST-RIP, P1
[8]
Coron JS, 2012, LECT NOTES COMPUT SC, V7237, P446, DOI 10.1007/978-3-642-29011-4_27
[9]
Damgård I, 2001, LECT NOTES COMPUT SC, V1992, P119
[10]
Dong Xin Luna, 2009, PROCEEDINGS OF THE VLDB ENDOWMENT, V2