共 36 条
- [22] Mishra P, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P2505
- [23] Deep Learning for IoT Big Data and Streaming Analytics: A Survey [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 2923 - 2960
- [24] ABY3: A Mixed Protocol Framework for Machine Learning [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 35 - 52
- [25] Motamedi M., 2016, ARXIV
- [26] Joint wireless power transfer and task offloading in mobile edge computing: a survey [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04): : 2429 - 2448
- [27] CRYPTFLow2: Practical 2-Party Secure Inference [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 325 - 342
- [28] Riazi MS, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P1501
- [29] Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 707 - 721
- [30] Tang J, 2017, COMPUTER, V50, P92, DOI 10.1109/MC.2017.3641648