共 34 条
[1]
[Anonymous], 2002, P 8 ACM SIGKDD INT C, DOI DOI 10.1145/775047.775080
[2]
[Anonymous], 2017, P 13 S US PRIV SEC
[3]
[Anonymous], IOT ATT AR GETT WORS
[4]
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS,
2011, 41 (01)
:260-272
[5]
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[6]
Burkhart M., 2008, CoRR
[7]
Coron JS, 2011, LECT NOTES COMPUT SC, V6841, P487, DOI 10.1007/978-3-642-22792-9_28
[8]
Domingo-Ferrer J, 2002, LECT NOTES COMPUT SC, V2433, P471
[9]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[10]
Huang Z., 2005, P 2005 ACM SIGMOD IN, P37, DOI DOI 10.1145/1066157.1066163