共 32 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[2]
[Anonymous], 2009, CIFAR-100 Dataset
[3]
Bhowmick A, 2019, Arxiv, DOI arXiv:1812.00984
[4]
Practical Secure Aggregation for Privacy-Preserving Machine Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1175-1191
[5]
McMahan HB, 2018, Arxiv, DOI arXiv:1710.06963
[6]
Bu Zhiqi, 2020, Harv Data Sci Rev, V2020, DOI 10.1162/99608f92.cfc5dd25
[7]
Bulletproofs: Short Proofs for Confidential Transactions and More
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2018,
:315-334
[8]
Camenisch J., 1997, Proof systems for general statements about discrete logarithms, V260
[9]
Cohen H., 1993, COURSE COMPUTATIONAL, V138, DOI 10.1007/978-3-662-02945-9
[10]
Dong JS, 2019, Arxiv, DOI arXiv:1905.02383