共 23 条
[1]
[Anonymous], 2018, COMPLEXITY, DOI DOI 10.1155/2018/3491960
[2]
Apple Differential Privacy Team, 2017, Learning with privacy at scale
[3]
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[4]
Machine Learning Classification over Encrypted Data
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[5]
Detection of selective forwarding attacks in heterogeneous sensor networks
[J].
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13,
2008,
:1583-1587
[6]
On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes
[J].
PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014,
2015, 8895
:239-258
[7]
Gang C., 2016, J CRYPTOLOGIC RES
[8]
Hard A, 2018, CORR
[9]
Hardy Stephen, 2017, PRIVATE FEDERATED LE
[10]
Kairouz P., 2019, arXiv:1912.04977