共 32 条
[1]
Ali M., Dhamotharan R., Khan E., Khan S.U., Vasilakos A.V., Li K., Zomaya A.Y., Sedasc: secure data sharing in clouds, IEEE Syst J, 11, 2, pp. 395-404, (2015)
[2]
Anand A., Singh A., A hybrid optimization-based medical data hiding scheme for industrial internet of things security, IEEE Trans on Indus Inform, (2022)
[3]
Cisco Secure
[4]
Frank A., Uci Machine Learning Repository, (2010)
[5]
Fu Z., Xia L., Sun X., Liu A.X., Xie G., Semantic-aware searching over encrypted data for cloud computing, IEEE Trans Inform Foren Secur, 13, 9, pp. 2359-2371, (2018)
[6]
Gao C.-Z., Cheng Q., He P., Susilo W., Li J., Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack, Inf Sci, 444, pp. 72-88, (2018)
[7]
Gong M., Feng J., Xie Y., Privacy-enhanced multi-party deep learning, Neural Netw, 121, pp. 484-496, (2020)
[8]
Gupta I., Gupta R., Singh A.K., Buyya R., Mlpam: a machine learning and probabilistic analysis based model for preserving security and privacy in cloud environment, IEEE Syst J, 15, pp. 4248-4259, (2020)
[9]
Hassan A., Hamza R., Yan H., Li P., An efficient outsourced privacy preserving machine learning scheme with public verifiability, IEEE Access, 7, pp. 146322-146330, (2019)
[10]
Hauer B., Data and information leakage prevention within the scope of information security, IEEE Access, 3, pp. 2554-2565, (2015)