暂无分享,去创建一个
Pengtao Xie | Michael Naehrig | Kristin E. Lauter | Ran Gilad-Bachrach | Mikhail Bilenko | Tom Finley | P. Xie | Ran Gilad-Bachrach | M. Bilenko | K. Lauter | M. Naehrig | Tom Finley | Mikhail Bilenko
[1] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[2] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[3] Mauro Barni,et al. Oblivious Neural Network Computing via Homomorphic Encryption , 2007, EURASIP J. Inf. Secur..
[4] M. Stone. The Generalized Weierstrass Approximation Theorem , 1948 .
[5] Michael Naehrig,et al. Private Computation on Encrypted Genomic Data , 2014, LATINCRYPT.
[6] L. Wasserman,et al. A Statistical Framework for Differential Privacy , 2008, 0811.2501.
[7] Anand D. Sarwate,et al. Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..
[8] Rich Caruana,et al. Model compression , 2006, KDD '06.
[9] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[10] Michael Naehrig,et al. ML Confidential: Machine Learning on Encrypted Data , 2012, ICISC.
[11] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[12] Adam D. Smith,et al. Privacy-preserving statistical estimation with optimal convergence rates , 2011, STOC '11.
[13] Stratis Ioannidis,et al. Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.
[14] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[15] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[16] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[17] Xinyun Chen. Under Review as a Conference Paper at Iclr 2017 Delving into Transferable Adversarial Ex- Amples and Black-box Attacks , 2016 .
[18] Marc'Aurelio Ranzato,et al. Large Scale Distributed Deep Networks , 2012, NIPS.
[19] Michael Naehrig,et al. Private Predictive Analysis on Encrypted Medical Data , 2014, IACR Cryptol. ePrint Arch..
[20] David J. Wu,et al. Using Homomorphic Encryption for Large Scale Statistical Analysis , 2012 .
[21] Martin J. Wainwright,et al. Privacy Aware Learning , 2012, JACM.
[22] Rich Caruana,et al. Do Deep Nets Really Need to be Deep? , 2013, NIPS.
[23] Stratis Ioannidis,et al. Privacy-preserving matrix factorization , 2013, CCS.
[24] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[25] Tao Wang,et al. Deep learning with COTS HPC systems , 2013, ICML.