共 36 条
- [1] QUOTIENT: Two-Party Secure Neural Network Training and Prediction [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1231 - 1247
- [2] Data Fusion and IoT for Smart Ubiquitous Environments: A Survey [J]. IEEE ACCESS, 2017, 5 : 9533 - 9554
- [3] Bian S., 2020, P IEEE CVF C COMP VI, P9403
- [4] nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data [J]. PROCEEDINGS OF THE 7TH ACM WORKSHOP ON ENCRYPTED COMPUTING & APPLIED HOMOMORPHIC CRYPTOGRAPHY (WAHC'19), 2019, : 45 - 56
- [5] Brakerski Z., 2012, ITCS 12, P309, DOI [10.1145/2090236.2090262, DOI 10.1145/2090236.2090262]
- [6] Chaudhari H., 2019, 27 ANN NETW DISTR
- [7] Collobert R., 2008, PROC INT C MACHINE L, P160, DOI DOI 10.1145/1390156.1390177
- [8] CHET: An Optimizing Compiler for Fully-Homomorphic Neural-Network Inferencing [J]. PROCEEDINGS OF THE 40TH ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '19), 2019, : 142 - 156
- [9] Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
- [10] Dowlin N, 2016, PR MACH LEARN RES, V48