Secure Efficient Federated KNN for Recommendation Systems
暂无分享,去创建一个
Leye Wang | Kai Chen | Zhaorong Liu | Kai Chen | Leye Wang | Zhaorong Liu
[1] John Riedl,et al. Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.
[2] Ilya P. Razenshteyn,et al. SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search , 2019, IACR Cryptol. ePrint Arch..
[3] Ming Liu,et al. Lifelong Federated Reinforcement Learning: A Learning Architecture for Navigation in Cloud Robotic Systems , 2019, IEEE Robotics and Automation Letters.
[4] Paul Voigt,et al. The EU General Data Protection Regulation (GDPR) , 2017 .
[5] Julian J. McAuley,et al. Ups and Downs: Modeling the Visual Evolution of Fashion Trends with One-Class Collaborative Filtering , 2016, WWW.
[6] Victor I. Chang,et al. Distributed behavior model orchestration in cognitive internet of things solution , 2016, Enterp. Inf. Syst..
[7] Kai Chen,et al. Secure Federated Matrix Factorization , 2019, IEEE Intelligent Systems.
[8] Sarvar Patel,et al. Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..
[9] Yunghsiang Sam Han,et al. Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.
[10] F. Maxwell Harper,et al. The MovieLens Datasets: History and Context , 2016, TIIS.
[11] Mikhail J. Atallah,et al. Efficient Privacy-Preserving k-Nearest Neighbor Search , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[12] Richard Nock,et al. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption , 2017, ArXiv.
[13] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[14] Yehuda Lindell,et al. How To Simulate It - A Tutorial on the Simulation Proof Technique , 2016, IACR Cryptol. ePrint Arch..
[15] James Bennett,et al. The Netflix Prize , 2007 .
[16] Stan Matwin,et al. Privacy Preserving K-nearest Neighbor Classification , 2005, Int. J. Netw. Secur..
[17] Debdeep Mukhopadhyay,et al. Efficient Secure k-Nearest Neighbours over Encrypted Data , 2018, EDBT.
[18] Wei Jiang,et al. Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.
[19] Hao Chen,et al. Fast Private Set Intersection from Homomorphic Encryption , 2017, CCS.
[20] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[21] Qiang Yang,et al. Federated Machine Learning , 2019, ACM Trans. Intell. Syst. Technol..
[22] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[23] Ja-Ling Wu,et al. A Privacy Preserving Cloud-Based K-NN Search Scheme with Lightweight User Loads , 2020, Comput..