共 73 条
[1]
Acar A(2018)A survey on homomorphic encryption schemes ACM Comput Surv 51 1-35
[2]
Aksu H(2020)Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues Knowl Based Syst 189 105124-127
[3]
Uluagac A(2009)Learning deep architectures for AI Found Trends Mach Learn 2 1-45
[4]
Conti M(2020)A review of privacy-preserving techniques for deep learning Neurocomputing 384 21-36
[5]
Aldweesh A(2014)(Leveled) fully homomorphic encryption without bootstrapping ACM Trans Comput Theory 6 1-472
[6]
Derhab A(2014)A tutorial survey of architectures, algorithms, and applications for deep learning APSIPA Trans Signal Inf Process 31 469-90
[7]
Emam A(1985)A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans Inf Theory 50 102419-444
[8]
Bengio Y(2020)Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study J Inf Secur Appl 147 70-88
[9]
Boulemtafes A(2018)Deep learning in agriculture: a survey Comput Electron Agric 521 436-26
[10]
Derhab A(2015)Deep learning Nature 42 60-4889