共 30 条
[1]
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[2]
Ammad-ud-din M, 2019, Arxiv, DOI arXiv:1901.09888
[3]
Scalable and Secure Logistic Regression via Homomorphic Encryption
[J].
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY,
2016,
:142-144
[4]
Augenstein S, 2020, Arxiv, DOI arXiv:1911.06679
[5]
Bhowmick A, 2019, Arxiv, DOI arXiv:1812.00984
[6]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[7]
Canetti R., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P639, DOI 10.1145/237814.238015
[8]
StarGAN: Unified Generative Adversarial Networks for Multi-Domain Image-to-Image Translation
[J].
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2018,
:8789-8797
[9]
Du WL, 2004, SIAM PROC S, P222
[10]
Differential privacy: A survey of results
[J].
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS,
2008, 4978
:1-19