共 46 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[2]
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[4]
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P420
[5]
Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
[6]
Machine Learning Classification over Encrypted Data
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[7]
EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning
[J].
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P),
2019,
:496-511
[8]
Chow S., 2009, NDSS, DOI [DOI 10.1109/ICDRET.2009.5454192, 10.1109/ICDRET.2009.5454192, DOI 10.1109/WI-IAT.2012.73]
[10]
Chowdhury S. H., 2019, P INT WORKSH SEC CLO, P1, DOI DOI 10.1145/3327962.3331455