共 44 条
[1]
[Anonymous], [No title captured]
[2]
[Anonymous], 2011, P 17 ACM SIGKDD INT, DOI [DOI 10.1145/2020408.2020487, DOI 10.2217/14622416.6.6.639, 10.1145/2020408.2020487. (Cit. on p. 2, DOI 10.1145/2020408.2020487.(CIT.ONP.2, 10.1145]
[3]
[Anonymous], [No title captured]
[4]
[Anonymous], [No title captured]
[5]
[Anonymous], [No title captured]
[6]
[Anonymous], 2004, USENIX SEC S
[7]
[Anonymous], IEEE T BIG DATA
[8]
[Anonymous], 2011, Differential Privacy, DOI [DOI 10.1007/978-1-4419-5906-5752, 10.1007/978-1-4419-5906-5752.https://doi.org/10.1007/978-1-4419-5906-5752]
[9]
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P420
[10]
Machine Learning Classification over Encrypted Data
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,