暂无分享,去创建一个
Lei Wang | Liang Li | Hao Wang | Jun Zhou | Shuang Yang | Li Wang | Chaochao Chen | Wenjing Fang | Alex Liu | A. Liu | Chaochao Chen | Jun Zhou | Hongya Wang | Lei Wang | Liang Li | Wenjing Fang | Li Wang | Shuang Yang
[1] Li Wang,et al. Industrial Scale Privacy Preserving Deep Neural Network , 2020, ArXiv.
[2] Anit Kumar Sahu,et al. Federated Learning: Challenges, Methods, and Future Directions , 2019, IEEE Signal Processing Magazine.
[3] Paulo Cortez,et al. A data-driven approach to predict the success of bank telemarketing , 2014, Decis. Support Syst..
[4] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[5] Jun Zhou,et al. Generalization in Generative Adversarial Networks: A Novel Perspective from Privacy Protection , 2019, NeurIPS.
[6] Paulo Cortez,et al. A Proactive Intelligent Decision Support System for Predicting the Popularity of Online News , 2015, EPIA.
[7] Bingzhe Wu,et al. Practical Privacy Preserving POI Recommendation , 2020, ACM Trans. Intell. Syst. Technol..
[8] Stratis Ioannidis,et al. Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.
[9] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[10] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[11] Adi Shamir,et al. How to share a secret , 1979, CACM.
[12] Krisztian Buza,et al. Feedback Prediction for Blogs , 2012, GfKl.
[13] Li Wang,et al. Privacy Preserving PCA for Multiparty Modeling , 2020, ArXiv.
[14] Yoshinori Aono,et al. Scalable and Secure Logistic Regression via Homomorphic Encryption , 2016, IACR Cryptol. ePrint Arch..
[15] Alan F. Karr,et al. Secure Statistical Analysis of Distributed Databases, Emphasizing What We Don't Know , 2010, J. Priv. Confidentiality.
[16] Zhicong Huang,et al. Logistic regression over encrypted data from fully homomorphic encryption , 2018, BMC Medical Genomics.
[17] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[18] Yehuda Lindell,et al. Efficient Secure Two-Party Protocols: Techniques and Constructions , 2010 .
[19] Michael Zohner,et al. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation , 2015, NDSS.
[20] Xiaoqian Jiang,et al. Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation , 2018, IACR Cryptol. ePrint Arch..
[21] S. Fienberg,et al. Secure multiple linear regression based on homomorphic encryption , 2011 .
[22] Jun Zhou,et al. Privacy Preserving Point-of-Interest Recommendation Using Decentralized Matrix Factorization , 2018, AAAI.
[23] T. Takagi,et al. Efficient scalar product protocol and its privacy-preserving application , 2015, Int. J. Electron. Secur. Digit. Forensics.
[24] Anderson C. A. Nascimento,et al. Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation , 2019, IEEE Transactions on Dependable and Secure Computing.
[25] Mariana Raykova,et al. Privacy-Preserving Distributed Linear Regression on High-Dimensional Data , 2017, Proc. Priv. Enhancing Technol..
[26] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[27] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[28] Liang Li,et al. Secure Social Recommendation based on Secret Sharing , 2020, ECAI.
[29] Benny Pinkas,et al. Faster Private Set Intersection Based on OT Extension , 2014, USENIX Security Symposium.