Private, Yet Practical, Multiparty Deep Learning
暂无分享,去创建一个
Ting Wang | Hui Wang | Shouling Ji | Xinyang Zhang | S. Ji | Ting Wang | Hui Wang | Xinyang Zhang
[1] Somesh Jha,et al. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing , 2014, USENIX Security Symposium.
[2] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[3] Yin Yang,et al. Functional Mechanism: Regression Analysis under Differential Privacy , 2012, Proc. VLDB Endow..
[4] Bhiksha Raj,et al. Privacy preserving probabilistic inference with Hidden Markov Models , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[5] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[6] Ling Liu,et al. Output privacy in data mining , 2011, TODS.
[7] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[8] Marc'Aurelio Ranzato,et al. Large Scale Distributed Deep Networks , 2012, NIPS.
[9] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[10] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[11] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[12] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[13] Anand D. Sarwate,et al. A near-optimal algorithm for differentially-private principal components , 2012, J. Mach. Learn. Res..
[14] Tzonelih Hwang,et al. Cryptosystem for Group Oriented Cryptography , 1991, EUROCRYPT.
[15] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[16] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[17] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[18] Chris Clifton,et al. Privacy-preserving Naïve Bayes classification , 2008, The VLDB Journal.
[19] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[20] Ye Zhang,et al. Fast and Secure Three-party Computation: The Garbled Circuit Approach , 2015, IACR Cryptol. ePrint Arch..
[21] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[22] Arun Rajkumar,et al. A Differentially Private Stochastic Gradient Descent Algorithm for Multiparty Classification , 2012, AISTATS.
[23] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[24] Pramod Viswanath,et al. Extremal Mechanisms for Local Differential Privacy , 2014, J. Mach. Learn. Res..
[25] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[26] Anand D. Sarwate,et al. Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..
[27] Stratis Ioannidis,et al. GraphSC: Parallel Secure Computation Made Easy , 2015, 2015 IEEE Symposium on Security and Privacy.
[28] Abhi Shelat,et al. Fast two-party secure computation with minimal assumptions , 2013, CCS.
[29] Adi Shamir,et al. How to share a secret , 1979, CACM.
[30] Bhiksha Raj,et al. Multiparty Differential Privacy via Aggregation of Locally Trained Classifiers , 2010, NIPS.
[31] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[32] Alexander J. Smola,et al. Parallelized Stochastic Gradient Descent , 2010, NIPS.
[33] B. Frey,et al. The human splicing code reveals new insights into the genetic determinants of disease , 2015, Science.
[34] Aziz Mohaisen,et al. Private Over-Threshold Aggregation Protocols , 2012, ICISC.
[35] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[36] Yunghsiang Sam Han,et al. Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.
[37] Demis Hassabis,et al. Mastering the game of Go with deep neural networks and tree search , 2016, Nature.