共 58 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[2]
QUOTIENT: Two-Party Secure Neural Network Training and Prediction
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:1231-1247
[3]
[Anonymous], 2017, ADV NEURAL INF PROC
[4]
Bagdasaryan E, 2018, arXiv
[5]
Bellare M., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P216
[6]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[7]
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I,
2018, 10991
:565-596
[8]
The Wonderful World of Global Random Oracles
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I,
2018, 10820
:280-312
[9]
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:395-412
[10]
Chen X., 2017, ARXIV171205526