Privacy-aware quadratic optimization using partially homomorphic encryption
暂无分享,去创建一个
Paulo Tabuada | Mani B. Srivastava | George J. Pappas | Sanjit A. Seshia | Yasser Shoukry | Konstantinos Gatsis | Amr Al-Anwar | M. Srivastava | S. Seshia | P. Tabuada | Yasser Shoukry | Amr Al-Anwar | Konstantinos Gatsis | George Pappas
[1] Ufuk Topcu,et al. Differentially Private Distributed Constrained Optimization , 2014, IEEE Transactions on Automatic Control.
[2] Zhenqi Huang,et al. Differentially Private Distributed Optimization , 2014, ICDCN.
[3] Takahiro Fujita,et al. Cyber-security enhancement of networked control systems using homomorphic encryption , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[4] Seiichi Shin,et al. Security enhancements of networked control systems using RSA public-key cryptosystem , 2015, 2015 10th Asian Control Conference (ASCC).
[5] Quanyan Zhu,et al. Secure and Resilient Control Design for Cloud Enabled Networked Control Systems , 2015, CPS-SPC '15.
[6] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[7] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[8] Christoph Böhm,et al. The Basic Applications , 2013 .
[9] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[10] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[11] Jorge Cortés,et al. Differentially Private Distributed Convex Optimization via Functional Perturbation , 2015, IEEE Transactions on Control of Network Systems.
[12] Magnus Egerstedt,et al. Differentially private cloud-based multi-agent optimization with constraints , 2015, 2015 American Control Conference (ACC).
[13] Frederik Armknecht,et al. A Guide to Fully Homomorphic Encryption , 2015, IACR Cryptol. ePrint Arch..
[14] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[15] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[16] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.