暂无分享,去创建一个
Li Li | Yuqing Ni | Junfeng Wu | Ling Shi | Ling Shi | Junfeng Wu | Yuqing Ni | Li Li
[1] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[2] Josh Benaloh,et al. Dense Probabilistic Encryption , 1999 .
[3] Bingsheng He,et al. The direct extension of ADMM for multi-block convex minimization problems is not necessarily convergent , 2014, Mathematical Programming.
[4] Stergios I. Roumeliotis,et al. SOI-KF: Distributed Kalman Filtering With Low-Cost Communications Using The Sign Of Innovations , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[5] Ali H. Sayed,et al. Diffusion Strategies for Distributed Kalman Filtering and Smoothing , 2010, IEEE Transactions on Automatic Control.
[6] Chao Yang,et al. Multi-Sensor Kalman Filtering With Intermittent Measurements , 2018, IEEE Transactions on Automatic Control.
[7] Geir E. Dullerud,et al. Differential Privacy in Linear Distributed Control Systems: Entropy Minimizing Mechanisms and Performance Tradeoffs , 2017, IEEE Transactions on Control of Network Systems.
[8] Costas J. Spanos,et al. Privacy-Enhanced Architecture for Occupancy-Based HVAC Control , 2016, 2017 ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS).
[9] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[10] William E. Winkler,et al. Multiplicative Noise for Masking Continuous Data , 2001 .
[11] Ruggero Carli,et al. Distributed Kalman filtering based on consensus strategies , 2008, IEEE Journal on Selected Areas in Communications.
[12] Ali Abur,et al. Power System Dynamic State Estimation: Motivations, Definitions, Methodologies, and Future Work , 2019, IEEE Transactions on Power Systems.
[13] Ali Akbar Safavi,et al. Private State Estimation for Cyber-physical Systems Using Semi-homomorphic Encryption , 2018 .
[14] Vinod Vaikuntanathan,et al. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.
[15] Quanyan Zhu,et al. Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning , 2017, IEEE Transactions on Information Forensics and Security.
[16] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[17] Junfeng Wu,et al. Gossip Algorithms that Preserve Privacy for Distributed Computation Part II: Performance Against Eavesdroppers , 2018, 2018 IEEE Conference on Decision and Control (CDC).
[18] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[19] Richard M. Murray,et al. Privacy preserving average consensus , 2014, 53rd IEEE Conference on Decision and Control.
[20] Francisco Javier González-Serrano,et al. State estimation using an extended Kalman filter with privacy-protected observed inputs , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[21] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[22] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[23] N. I. Miridakis,et al. Linear Estimation , 2018, Digital and Statistical Signal Processing.
[24] Yih-Fang Huang,et al. Privacy preserving decentralized power system state estimation with phasor measurement units , 2016, 2016 IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM).
[25] Chi-Tsong Chen,et al. Linear System Theory and Design , 1995 .
[26] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2019, 2019 IEEE 26th Symposium on Computer Arithmetic (ARITH).
[27] Xin Wang,et al. Privacy-Preserving Distributed Machine Learning via Local Randomization and ADMM Perturbation , 2019, IEEE Transactions on Signal Processing.
[28] Fan Zhang,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[29] Wenyuan Xu,et al. Neighborhood watch: security and privacy analysis of automatic meter reading systems , 2012, CCS.
[30] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[31] Giorgio Battistelli,et al. Consensus-Based Linear and Nonlinear Filtering , 2015, IEEE Transactions on Automatic Control.
[32] Ismail Güvenç,et al. Secure Data Obfuscation Scheme to Enable Privacy-Preserving State Estimation in Smart Grid AMI Networks , 2016, IEEE Internet of Things Journal.
[33] Junfeng Wu,et al. Gossip Algorithms that Preserve Privacy for Distributed Computation Part I: The Algorithms and Convergence Conditions , 2018, 2018 IEEE Conference on Decision and Control (CDC).
[34] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[35] Ling Shi,et al. Multi-Sensor-Based Aperiodic Least-Squares Estimation for Networked Systems With Transmission Constraints , 2015, IEEE Transactions on Signal Processing.
[36] Reza Olfati-Saber,et al. Distributed Kalman filtering for sensor networks , 2007, 2007 46th IEEE Conference on Decision and Control.
[37] Yang Song,et al. Compressive Privacy for a Linear Dynamical System , 2018, IEEE Transactions on Information Forensics and Security.
[38] Bruno Sinopoli,et al. Kalman filtering with intermittent observations , 2004, IEEE Transactions on Automatic Control.
[39] Ling Shi,et al. An event-triggered approach to state estimation with multiple point- and set-valued measurements , 2014, Autom..
[40] Khosrow Moslehi,et al. Power System Control Centers: Past, Present, and Future , 2005, Proceedings of the IEEE.
[41] Iman Shames,et al. Secure and private control using semi-homomorphic encryption , 2017 .
[42] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[43] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.