共 23 条
[11]
Liu Y., 2019, PROC 2 NEURIPS WORKS
[12]
López-Alt A, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P1219
[13]
McMahan HB, 2017, PR MACH LEARN RES, V54, P1273
[14]
Two Round Multiparty Computation via Multi-key FHE
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II,
2016, 9666
:735-763
[15]
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:334-348
[16]
Reyzin L., 2018, The International Association for Cryptologic Research (IACR) Cryptology ePrint Archive, 2018, V2018, P997
[17]
Honeycrisp: Large-Scale Differentially Private Aggregation Without a Trusted Core
[J].
PROCEEDINGS OF THE TWENTY-SEVENTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '19),
2019,
:196-210
[18]
Rouhani BD, 2018, DES AUT CON, DOI [10.1109/DAC.2018.8465894, 10.1145/3195970.3196023]
[19]
When Energy Trading Meets Blockchain in Electrical Power System: The State of the Art
[J].
APPLIED SCIENCES-BASEL,
2019, 9 (08)