暂无分享,去创建一个
[1] Murat Kantarcioglu,et al. GINN: Fast GPU-TEE Based Integrity for Neural Network Training , 2022, CODASPY.
[2] Surya Nepal,et al. Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? , 2020, AsiaCCS.
[3] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[4] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[5] Yi Yang,et al. Image Clustering Using Local Discriminant Models and Global Integration , 2010, IEEE Transactions on Image Processing.
[6] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[7] Badih Ghazi,et al. Deep Learning with Label Differential Privacy , 2021, NeurIPS.
[8] Joaquin Quiñonero Candela,et al. Practical Lessons from Predicting Clicks on Ads at Facebook , 2014, ADKDD'14.
[9] Adam J. Hall,et al. Practical Defences Against Model Inversion Attacks for Split Neural Networks , 2021, ArXiv.
[10] Ramesh Raskar,et al. Split learning for health: Distributed deep learning without sharing raw patient data , 2018, ArXiv.
[11] Michael Zohner,et al. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation , 2015, NDSS.
[12] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[13] Yuanming Shi,et al. A Quasi-Newton Method Based Vertical Federated Learning Framework for Logistic Regression , 2019, ArXiv.
[14] Zijun Guo,et al. A homomorphic-encryption-based vertical federated learning scheme for rick management , 2020, Comput. Sci. Inf. Syst..
[15] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[16] Pranjul Yadav,et al. Reacting to Variations in Product Demand: An Application for Conversion Rate (CR) Prediction in Sponsored Search , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[17] Brent Waters,et al. A Framework for Efficient and Composable Oblivious Transfer , 2008, CRYPTO.
[18] Yehuda Lindell,et al. More efficient oblivious transfer and extensions for faster secure computation , 2013, CCS.
[19] Mark Silberstein,et al. Eleos: ExitLess OS Services for SGX Enclaves , 2017, EuroSys.
[20] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[21] Johannes Winter,et al. Trusted computing building blocks for embedded linux-based ARM trustzone platforms , 2008, STC '08.
[22] Hao Chen,et al. Fast Private Set Intersection from Homomorphic Encryption , 2017, CCS.
[23] Ramesh Raskar,et al. Distributed learning of deep neural network over multiple agents , 2018, J. Netw. Comput. Appl..
[24] Junyuan Xie,et al. Label Leakage and Protection in Two-party Split Learning , 2021, ArXiv.