共 59 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[2]
[Anonymous], 2014, Comput. Sci.
[3]
[Anonymous], 2017, ARXIV170508963
[4]
Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:843-862
[5]
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:805-817
[6]
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P420
[7]
Ben-David A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P257
[8]
Blakley GR, 1979, P AFIPS NEW YORK NY, P313, DOI DOI 10.1109/MARK.1979.8817296
[10]
Bogdanov D, 2008, LECT NOTES COMPUT SC, V5283, P192