When Evolutionary Computation Meets Privacy
暂无分享,去创建一个
[1] K. Lai,et al. PriMPSO: A Privacy-Preserving Multiagent Particle Swarm Optimization Algorithm. , 2022, IEEE transactions on cybernetics.
[2] J. Kůdela. A critical problem in benchmarking and analysis of evolutionary computation methods , 2022, Nat. Mac. Intell..
[3] Yaochu Jin,et al. A Secure Federated Data-Driven Evolutionary Multi-objective Optimization Algorithm , 2022, ArXiv.
[4] Ximeng Liu,et al. Evolution as a Service: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization , 2022, ArXiv.
[5] Sergio Pastrana,et al. SoK: Privacy-Preserving Computation Techniques for Deep Learning , 2021, Proc. Priv. Enhancing Technol..
[6] Petr Bujok,et al. Differential Evolution with Distance-based Mutation-selection Applied to CEC 2021 Single Objective Numerical Optimisation , 2021, 2021 IEEE Congress on Evolutionary Computation (CEC).
[7] Héctor-Gabriel Acosta-Mesa,et al. A Review on Convolutional Neural Network Encodings for Neuroevolution , 2021, IEEE Transactions on Evolutionary Computation.
[8] Zhi-hui Zhan,et al. A New Evolutionary Computation Framework for Privacy-Preserving Optimization , 2021, 2021 13th International Conference on Advanced Computational Intelligence (ICACI).
[9] Jun Zhang,et al. A Classifier-Assisted Level-Based Learning Swarm Optimizer for Expensive Optimization , 2020, IEEE Transactions on Evolutionary Computation.
[10] Qi Li,et al. Attribute-based Encryption for Cloud Computing Access Control , 2020, ACM Comput. Surv..
[11] Jun Zhang,et al. A Distributed Swarm Optimizer With Adaptive Communication for Large-Scale Optimization , 2020, IEEE Transactions on Cybernetics.
[12] Abdelouahid Derhab,et al. A review of privacy-preserving techniques for deep learning , 2020, Neurocomputing.
[13] Fenghua Li,et al. Privacy Computing: Concept, Computing Framework And Future Development Trends , 2019, IACR Cryptol. ePrint Arch..
[14] Dan Guo,et al. Data-Driven Evolutionary Optimization: An Overview and Case Studies , 2019, IEEE Transactions on Evolutionary Computation.
[15] Zhiqiang Lin,et al. Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[16] Hubert Eichner,et al. Towards Federated Learning at Scale: System Design , 2019, SysML.
[17] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[18] Qingfu Zhang,et al. A Self-Organizing Multiobjective Evolutionary Algorithm , 2016, IEEE Transactions on Evolutionary Computation.
[19] Qingfu Zhang,et al. Distributed evolutionary algorithms and their models: A survey of the state-of-the-art , 2015, Appl. Soft Comput..
[20] Florian Kerschbaum,et al. Privacy-Preserving Multi-Objective Evolutionary Algorithms , 2010, PPSN.
[21] Shuguo Han,et al. Privacy-Preserving Genetic Algorithms for Rule Discovery , 2007, DaWaK.
[22] Erkam Uzun,et al. Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search , 2021, USENIX Security Symposium.
[23] Leqi Jiang,et al. Privacy-Preserving Genetic Algorithm Outsourcing in Cloud Computing , 2020 .
[24] Ruxu Du,et al. Micro manufacturing techniques and applications : selected, peer reviewed papers from the 2nd International Forum on Micro Manufacturing (IFMM2012), December 17-18, 2012, South China University of Technology, Guangzhou, China , 2013 .