共 40 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[2]
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I,
2018, 10991
:597-627
[3]
[Anonymous], 2007, 7 IEEE INT C DAT MIN
[4]
Scalable and Secure Logistic Regression via Homomorphic Encryption
[J].
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY,
2016,
:142-144
[5]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[6]
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
[7]
Chai D., ARXIV190605108
[8]
Dong J., 2019, ARXIV190502383
[9]
Calibrating noise to sensitivity in private data analysis
[J].
THEORY OF CRYPTOGRAPHY, PROCEEDINGS,
2006, 3876
:265-284
[10]
Fienberg SE, 2006, LECT NOTES COMPUT SC, V4302, P277