Privacy-Preserving Deep Learning: A Comprehensive Survey
暂无分享,去创建一个
[1] J. Morton,et al. Snowmobile effects on height and live stem abundance of wetland shrubs in south-central Alaska , 2021 .
[2] Van-Nam Huynh,et al. An efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation , 2021, Neurocomputing.
[3] Marcel Keller,et al. MP-SPDZ: A Versatile Framework for Multi-Party Computation , 2020, IACR Cryptol. ePrint Arch..
[4] Chenyu Shi,et al. Secure Collaborative Training and Inference for XGBoost , 2020, PPMLP@CCS.
[5] D. Gregovich,et al. Steep and deep: Terrain and climate factors explain brown bear (Ursus arctos) alpine den site selection to guide heli-skiing management , 2020, PloS one.
[6] Daniel Hurtado Ram'irez,et al. Privacy Preserving K-Means Clustering: A Secure Multi-Party Computation Approach , 2020, ArXiv.
[7] Daniel Rueckert,et al. Robust Aggregation for Adaptive Privacy Preserving Federated Learning in Healthcare , 2020, ArXiv.
[8] Jean-Pierre Hubaux,et al. POSEIDON: Privacy-Preserving Federated Neural Network Learning , 2020, NDSS.
[9] Yingjie Wang,et al. A privacy-preserving mechanism based on local differential privacy in edge computing , 2020, China Communications.
[10] Mark Last,et al. CryptoRNN - Privacy-Preserving Recurrent Neural Networks Using Homomorphic Encryption , 2020, CSCML.
[11] Rickmer Braren,et al. Secure, privacy-preserving and federated machine learning in medical imaging , 2020, Nature Machine Intelligence.
[12] Huaqun Wang,et al. A Privacy-Preserving and Verifiable Federated Learning Scheme , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).
[13] Tao Xiang,et al. A training-integrity privacy-preserving federated learning scheme with trusted execution environment , 2020, Inf. Sci..
[14] Zhong Fan,et al. A Review of Privacy-Preserving Federated Learning for the Internet-of-Things , 2020 .
[15] Abdelouahid Derhab,et al. A review of privacy-preserving techniques for deep learning , 2020, Neurocomputing.
[16] James J. Q. Yu,et al. Privacy-Preserving Traffic Flow Prediction: A Federated Learning Approach , 2020, IEEE Internet of Things Journal.
[17] Jung Hee Cheon,et al. HE-Friendly Algorithm for Privacy-Preserving SVM Training , 2020, IEEE Access.
[18] Sotiris Ioannidis,et al. TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud , 2020, CODASPY.
[19] Lalana Kagal,et al. PrivacyFL: A Simulator for Privacy-Preserving and Secure Federated Learning , 2020, CIKM.
[20] Maoguo Gong,et al. Preserving differential privacy in deep neural networks with relevance-based adaptive noise imposition , 2020, Neural Networks.
[21] Natalia Gimelshein,et al. PyTorch: An Imperative Style, High-Performance Deep Learning Library , 2019, NeurIPS.
[22] Weijie J. Su,et al. Deep Learning with Gaussian Differential Privacy , 2019, Harvard data science review.
[23] Ananda Theertha Suresh,et al. Can You Really Backdoor Federated Learning? , 2019, ArXiv.
[24] Yu Zhou,et al. Privacy Preserving Distributed Data Mining Based on Secure Multi-party Computation , 2019, 2019 IEEE 11th International Conference on Advanced Infocomm Technology (ICAIT).
[25] Jacob S. Ivan,et al. Winter recreation and Canada lynx: reducing conflict through niche partitioning , 2019, Ecosphere.
[26] Aseem Rastogi,et al. CrypTFlow: Secure TensorFlow Inference , 2019, 2020 IEEE Symposium on Security and Privacy (SP).
[27] Sameer Wagh,et al. SecureNN: 3-Party Secure Computation for Neural Network Training , 2019, Proc. Priv. Enhancing Technol..
[28] Jiong Jin,et al. Towards Fair and Privacy-Preserving Federated Deep Models , 2019, IEEE Transactions on Parallel and Distributed Systems.
[29] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2019, 2019 IEEE 26th Symposium on Computer Arithmetic (ARITH).
[30] Nicolas Gama,et al. TFHE: Fast Fully Homomorphic Encryption Over the Torus , 2019, Journal of Cryptology.
[31] Chao Li,et al. CryptoNN: Training Neural Networks over Encrypted Data , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[32] Wei Zhang,et al. Differential Privacy Preservation in Deep Learning: Challenges, Opportunities and Solutions , 2019, IEEE Access.
[33] Guosheng Lin,et al. On lightweight privacy-preserving collaborative learning for internet-of-things objects , 2019, IoTDI.
[34] Hubert Eichner,et al. Towards Federated Learning at Scale: System Design , 2019, SysML.
[35] Amir Salman Avestimehr,et al. CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning , 2019, IEEE Journal on Selected Areas in Information Theory.
[36] Joseph D. Holbrook,et al. Wolverines in winter: indirect habitat loss and functional responses to backcountry recreation , 2019, Ecosphere.
[37] Rui Zhang,et al. A Hybrid Approach to Privacy-Preserving Federated Learning , 2018, Informatik Spektrum.
[38] Yang Song,et al. Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning , 2018, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[39] G. Wittemyer,et al. Modeling anthropogenic noise impacts on animals in natural areas , 2018, Landscape and Urban Planning.
[40] Li Fei-Fei,et al. Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference , 2018, ArXiv.
[41] Daniel Rueckert,et al. A generic framework for privacy preserving deep learning , 2018, ArXiv.
[42] Peter Rindal,et al. ABY3: A Mixed Protocol Framework for Machine Learning , 2018, IACR Cryptol. ePrint Arch..
[43] Xiaoqian Jiang,et al. Secure Outsourced Matrix Computation and Application to Neural Networks , 2018, CCS.
[44] Xu An Wang,et al. Privacy-Preserving All Convolutional Net Based on Homomorphic Encryption , 2018, NBiS.
[45] Pascal Paillier,et al. Fast Homomorphic Evaluation of Deep Discretized Neural Networks , 2018, IACR Cryptol. ePrint Arch..
[46] Thomas F. Wenisch,et al. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.
[47] Jacob S. Ivan,et al. Sharing the same slope: Behavioral responses of a threatened mesocarnivore to motorized and nonmotorized winter recreation , 2018, Ecology and evolution.
[48] Varun Kanade,et al. TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service , 2018, ICML.
[49] Dan Boneh,et al. Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware , 2018, ICLR.
[50] Mario Fritz,et al. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models , 2018, NDSS.
[51] Zheng Huang,et al. Distributed Large Scale Privacy-Preserving Deep Mining , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).
[52] Guocong Song,et al. Collaborative Learning for Deep Neural Networks , 2018, NeurIPS.
[53] Jung Hee Cheon,et al. Bootstrapping for Approximate Homomorphic Encryption , 2018, IACR Cryptol. ePrint Arch..
[54] K. Elder,et al. Snowmobile impacts on snowpack physical and mechanical properties , 2018 .
[55] Vitaly Shmatikov,et al. Chiron: Privacy-preserving Machine Learning as a Service , 2018, ArXiv.
[56] Torsten Hoefler,et al. Demystifying Parallel and Distributed Deep Learning , 2018, ACM Comput. Surv..
[57] Laurence T. Yang,et al. Secure weighted possibilistic c-means algorithm on cloud for clustering big data , 2018, Inf. Sci..
[58] Anantha Chandrakasan,et al. Gazelle: A Low Latency Framework for Secure Neural Network Inference , 2018, IACR Cryptol. ePrint Arch..
[59] Reza Shokri,et al. Machine Learning with Membership Privacy using Adversarial Regularization , 2018, CCS.
[60] Farinaz Koushanfar,et al. Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications , 2018, IACR Cryptol. ePrint Arch..
[61] Jung Hee Cheon,et al. Homomorphic Encryption for Arithmetic of Approximate Numbers , 2017, ASIACRYPT.
[62] Richard Nock,et al. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption , 2017, ArXiv.
[63] Hassan Takabi,et al. CryptoDL: Deep Neural Networks over Encrypted Data , 2017, ArXiv.
[64] Yao Lu,et al. Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..
[65] Sarvar Patel,et al. Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..
[66] Miguel A. Labrador,et al. Privacy-Preserving Mechanisms for Crowdsensing: Survey and Research Challenges , 2017, IEEE Internet of Things Journal.
[67] S. Gage,et al. Acoustic Footprint of Snowmobile Noise and Natural Quiet Refugia in an Alaskan Wilderness , 2017, Natural Areas Journal.
[68] W. Zielinski,et al. Ski areas affect Pacific marten movement, habitat use, and density , 2017 .
[69] P. Bateman,et al. Are negative effects of tourist activities on wildlife over-reported? A review of assessment methods and empirical results , 2017 .
[70] Farinaz Koushanfar,et al. DeepSecure: Scalable Provably-Secure Deep Learning , 2017, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[71] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[72] Efraim Rotem,et al. Inside 6th-Generation Intel Core: New Microarchitecture Code-Named Skylake , 2017, IEEE Micro.
[73] Giuseppe Ateniese,et al. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.
[74] Courtney L. Larson,et al. Effects of Recreation on Animals Revealed as Widespread through a Global Systematic Review , 2016, PloS one.
[75] Nicolas Gama,et al. Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds , 2016, ASIACRYPT.
[76] Emmett Witchel,et al. Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data , 2016, OSDI.
[77] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[78] Martín Abadi,et al. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data , 2016, ICLR.
[79] Ran El-Yaniv,et al. Quantized Neural Networks: Training Neural Networks with Low Precision Weights and Activations , 2016, J. Mach. Learn. Res..
[80] A. Juels,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[81] Sebastian Nowozin,et al. Oblivious Multi-Party Machine Learning on Trusted Processors , 2016, USENIX Security Symposium.
[82] Kelly J. Sivy,et al. Variable effects of snow conditions across boreal mesocarnivore species , 2016 .
[83] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[84] Carlos V. Rozas,et al. Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave , 2016, HASP 2016.
[85] S. Gage,et al. Temporal and spatial variation of a winter soundscape in south-central Alaska , 2016, Landscape Ecology.
[86] Ciarán Mc Goldrick,et al. Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs , 2016, AFRICACRYPT.
[87] S. Côté,et al. Space use analyses suggest avoidance of a ski area by mountain goats , 2016 .
[88] Blaise Agüera y Arcas,et al. Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.
[89] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[90] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[91] Xintao Wu,et al. Regression Model Fitting under Differential Privacy and Model Inversion Attack , 2015, IJCAI.
[92] R. Palme,et al. Disturbance of wildlife by outdoor winter recreation: allostatic stress response and altered activity-energy budgets. , 2015, Ecological applications : a publication of the Ecological Society of America.
[93] Léo Ducas,et al. FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second , 2015, EUROCRYPT.
[94] Mikhail Belkin,et al. Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[95] M. McDaniel,et al. Polycyclic Aromatic Hydrocarbons in the Snowpack and Surface Water in Blackwood Canyon, Lake Tahoe, CA, as Related to Snowmobile Activity , 2015 .
[96] T. Mullet. Effects of snowmobile noise and activity on a boreal ecosystem in southcentral Alaska , 2014 .
[97] V. Bleich,et al. Demographic responses of bighorn sheep to recreational activities: A trial of a trail , 2014 .
[98] Katie M. Moriarty. Habitat use and movement behavior of Pacific marten (Martes caurina) in response to forest management practices in Lassen National Forest, California , 2014 .
[99] Alexander J. Smola,et al. Scaling Distributed Machine Learning with the Parameter Server , 2014, OSDI.
[100] N. Nepal. A Geospatial Approach to Wildlife and Wilderness Management , 2014 .
[101] Somesh Jha,et al. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing , 2014, USENIX Security Symposium.
[102] R. Sweitzer,et al. Using DNA to describe and quantify interspecific killing of fishers in California , 2014 .
[103] R. Nielson,et al. Effects of winter recreation on northern ungulates with focus on moose (Alces alces) and snowmobiles , 2014, European Journal of Wildlife Research.
[104] J. Barber,et al. An experimental investigation into the effects of traffic noise on distributions of birds: avoiding the phantom road , 2013, Proceedings of the Royal Society B: Biological Sciences.
[105] K. Longshore,et al. Detecting short‐term responses to weekend recreation activity: Desert bighorn sheep avoidance of hiking trails , 2013 .
[106] S. Côté,et al. Do mountain goats habituate to helicopter disturbance , 2013 .
[107] S. Buskirk,et al. Footload influences wildlife use of compacted trails in the snow , 2013 .
[108] Jung Hee Cheon,et al. Batch Fully Homomorphic Encryption over the Integers , 2013, EUROCRYPT.
[109] Marc'Aurelio Ranzato,et al. Large Scale Distributed Deep Networks , 2012, NIPS.
[110] Michael Naehrig,et al. ML Confidential: Machine Learning on Encrypted Data , 2012, ICISC.
[111] Joseph M. Northrup,et al. Effects of Humans on Behaviour of Wildlife Exceed Those of Natural Predators in a Landscape of Fear , 2012, PloS one.
[112] O. Schmitz,et al. Projected range shifting by montane mammals under climate change: implications for Cascadia's National Parks , 2012 .
[113] Catherine P. Ortega,et al. CHAPTER 2 EffECTS Of NOiSE POLLUTiON ON biRdS: A bRiEf REViEw Of OUR kNOwLEdgE , 2012 .
[114] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[115] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[116] Vinod Vaikuntanathan,et al. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.
[117] Veronika Braunisch,et al. Spatially explicit modeling of conflict zones between wildlife and snow sports: prioritizing areas for winter refuges. , 2011, Ecological applications : a publication of the Ecological Society of America.
[118] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[119] Holger Dettki,et al. Does off-trail backcountry skiing disturb moose? , 2010, European Journal of Wildlife Research.
[120] Dan Boneh,et al. Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.
[121] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[122] Kevin R Crooks,et al. The costs of chronic noise exposure for terrestrial organisms. , 2010, Trends in ecology & evolution.
[123] Yen-Wei Chen,et al. Feature Selection Using Recursive Feature Elimination for Handwritten Digit Recognition , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[124] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[125] Leslie M. Naylor,et al. Behavioral Responses of North American Elk to Recreational Activity , 2009 .
[126] T. Stankowich. Ungulate flight responses to human disturbance: a review and meta-analysis. , 2008 .
[127] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[128] S. Côté,et al. Habitat use patterns in relation to escape terrain : are alpine ungulate females trading off better foraging sites for safety? , 2007 .
[129] L. Ruggiero,et al. Wolverine Conservation and Management , 2007 .
[130] B. Keller,et al. Bighorn Sheep Response to Road-Related Disturbances in Rocky Mountain National Park, Colorado , 2007 .
[131] J. Krebs,et al. Multiscale Habitat Use by Wolverines in British Columbia, Canada , 2007 .
[132] C. Carroll. Interacting Effects of Climate Change, Landscape Conversion, and Harvest on Carnivore Populations at the Range Margin: Marten and Lynx in the Northern Appalachians , 2007, Conservation biology : the journal of the Society for Conservation Biology.
[133] J. Squires,et al. The Effect of Snowmobile Trails on Coyote Movements Within Lynx Home Ranges , 2007 .
[134] Chris J. Johnson,et al. Displacement of Mountain Caribou From Winter Habitat by Snowmobiles , 2007 .
[135] Yufei Tao,et al. M-invariance: towards privacy preserving re-publication of dynamic datasets , 2007, SIGMOD '07.
[136] M. Schaub,et al. Spreading free-riding snow sports represent a novel serious threat for wildlife , 2007, Proceedings of the Royal Society B: Biological Sciences.
[137] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[138] R. Musselman,et al. Air quality at a snowmobile staging area and snow chemistry on and off trail in a Rocky Mountain subalpine forest, Snowy Range, Wyoming , 2007, Environmental monitoring and assessment.
[139] A. Hastings,et al. Modeling Sound due to Over-Snow Vehicles in Yellowstone and Grand Teton National Parks , 2006 .
[140] J. Borkowski,et al. Behavioral responses of bison and elk in Yellowstone to snowmobiles and snow coaches. , 2006, Ecological applications : a publication of the Ecological Society of America.
[141] J. T. Flinders,et al. Potential Impacts of Coyotes and Snowmobiles on Lynx Conservation in the Intermountain West , 2006 .
[142] R. May,et al. Impact of infrastructure on habitat selection of wolverines Gulo gulo , 2006 .
[143] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[144] D. Lindenmayer,et al. The implications of snow-based recreation for small mammals in the subnivean space in south-east Australia. , 2006 .
[145] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[146] Stephen P. Boyd,et al. Robust Fisher Discriminant Analysis , 2005, NIPS.
[147] Aaron J. Poe,et al. Mountain goat response to helicopter overflights in Alaska , 2005 .
[148] Brent Waters. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[149] O. Vistad,et al. Recreational Conflict Is Affective: The Case of Cross-Country Skiers and Snowmobiles , 2004 .
[150] Jonathan Katz,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[151] Michael J. Wisdom,et al. EVALUATION OF LANDSCAPE MODELS FOR WOLVERINES IN THE INTERIOR NORTHWEST, UNITED STATES OF AMERICA , 2003 .
[152] Robert P. W. Duin,et al. Bagging, Boosting and the Random Subspace Method for Linear Classifiers , 2002, Pattern Analysis & Applications.
[153] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[154] R. Noss,et al. CARNIVORES AS FOCAL SPECIES FOR CONSERVATION PLANNING IN THE ROCKY MOUNTAIN REGION , 2001 .
[155] F. J. Singer,et al. Responses of Desert Bighorn Sheep to Increased Human Recreation , 2001 .
[156] E. Bull,et al. SURVIVAL, CAUSES OF MORTALITY, AND REPRODUCTION IN THE AMERICAN MARTEN IN NORTHEASTERN OREGON , 2001 .
[157] Jason C. Ross,et al. Measurement and modeling of snowmobile noise and audibility at Yellowstone and Grand Teton National Parks , 2000 .
[158] Audrey J. Magoun,et al. Characteristics of wolverine reproductive den sites , 1998 .
[159] J. Gaillard,et al. Effects of density and weather on survival of bighorn sheep lambs ( Ovis canadensis ) , 1998 .
[160] James M. Keller,et al. The possibilistic C-means algorithm: insights and recommendations , 1996, IEEE Trans. Fuzzy Syst..
[161] S. Boutin,et al. Hunting behaviour of a sympatric felid and canid in relation to vegetative cover , 1995, Animal Behaviour.
[162] A. Schwarzenberg-Czerny. On matrix factorization and efficient least squares solution. , 1995 .
[163] Donald D. Katnik,et al. Survival in an Intensively Trapped Marten Population in Maine , 1994 .
[164] S. Boutin,et al. The influence of snow on lynx and coyote movements: does morphology affect behavior? , 1991, Oecologia.
[165] T. Fuller. Effect of snow depth on wolf activity and prey selection in north central Minnesota , 1991 .
[166] K. Parker,et al. Energy expenditures for locomotion by mule deer and elk , 1984 .
[167] M. Hornocker,et al. Ecology of the wolverine in northwestern Montana , 1981 .
[168] R. H. Johnston,et al. Factors influencing heart rate in free-ranging bighorn sheep: a physiological approach to the study of wildlife harassment , 1979 .
[169] J. Bollinger,et al. Snowmobile Effects on Movements of White-tailed Deer: A Case-study , 1979, Environmental Conservation.
[170] M. J. Dorrance,et al. EFFECTS OF SNOWMOBILES ON WHITE-TAILED DEER , 1975 .
[171] J. J. Ozoga,et al. Winter activities and feeding habits of northern Michigan coyotes. , 1966 .
[172] Jing He,et al. Privacy preserving classification on local differential privacy in data centers , 2020, J. Parallel Distributed Comput..
[173] Harry Chandra Tanuwidjaja,et al. Privacy-Preserving Deep Learning on Machine Learning as a Service—a Comprehensive Survey , 2020, IEEE Access.
[174] Dong Seong Kim,et al. Privacy-Preserving Reinforcement Learning Using Homomorphic Encryption in Cloud Computing Infrastructures , 2020, IEEE Access.
[175] Pan Hui,et al. Privacy-Preserving Asynchronous Federated Learning Mechanism for Edge Network Computing , 2020, IEEE Access.
[176] Robert Laganière,et al. Membership Inference Attack against Differentially Private Deep Learning Model , 2018, Trans. Data Priv..
[177] U. Fish. RELATIONSHIP BETWEEN SNOW DEPTH AND GRAY WOLF PREDATION ON WHITE-TAILED DEER , 2018 .
[178] S. Boutin,et al. Snow conditions influence grey wolf (Canis lupus) travel paths: the effect of human-created linear features , 2018 .
[179] Chris J. Johnson,et al. Spatiotemporal response of mountain caribou to the intensity of backcountry skiing , 2018 .
[180] Constance Morel,et al. Privacy-Preserving Classification on Deep Neural Network , 2017, IACR Cryptol. ePrint Arch..
[181] Melissa Chase,et al. Private Collaborative Neural Network Learning , 2017, IACR Cryptol. ePrint Arch..
[182] A. Courtemanch. Seasonal habitat selection and impacts of backcountry recreation on a formerly migratory bighorn sheep population in northwest Wyoming, USA , 2014 .
[183] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[184] W. Krohn. Distribution changes of American martens and fishers in eastern North America, 1699–2001 - Chapter 4 , 2012 .
[185] Lowell H. Suring,et al. Brown Bear Den Habitat and Winter Recreation in South-Central Alaska , 2010 .
[186] G. Pederson,et al. A century of climate and ecosystem change in Western Montana: what do temperature trends portend? , 2010 .
[187] Jennifer L. B. Dowd. Coyote Diet and Movements in Relation to Winter Recreation in Northwestern Wyoming: Implications for Lynx Conservation , 2010 .
[188] S. Mccool,et al. Finite Recreation Opportunities: The Forest Service, the Bureau of Land Management, and Off-Road Vehicle Management , 2009 .
[189] J. Jokimäki,et al. Territory occupancy and breeding success of the Golden Eagle (Aquila chrysaetos) around tourist destinations in northern Finland , 2008 .
[190] N. Freeman. MOTORIZED BACKCOUNTRY RECREATION AND STRESS RESPONSE IN MOUNTAIN CARIBOU (Rangifer tarandus caribou) , 2008 .
[191] UNDERGRADUATE PROGRAMS,et al. COLLEGE OF AGRICULTURE AND NATURAL RESOURCES , 2005 .
[192] H. Preisler,et al. Effects of off-road recreation on mule deer and elk. , 2004 .
[193] S. Cherry,et al. Grizzly bear denning and potential conflict areas in the Greater Yellowstone Ecosystem , 2002 .
[194] Padhraic Smyth,et al. Model selection for probabilistic clustering using cross-validated likelihood , 2000, Stat. Comput..
[195] K. Aubry. Ecology of Canada lynx in Southern boreal forest , 2000 .
[196] K. Simpson,et al. IMPACTS OF BACKCOUNTRY RECREATION ACTIVITIES ON MOUNTAIN CARIBOU , 2000 .
[197] Nancy Warren,et al. CANADA LYNX CONSERVATION ASSESSMENT AND STRATEGY , 2000 .
[198] Grant Hokit,et al. EFFECTS OF RECREATION ON ROCKY MOUNTAIN WILDLIFE A Review for Montana www.montanatws.org MONTANA CHAPTER OF THE WILDLIFE SOCIETY Written by Bryce Maxell - Wildlife Biology Program, University of Montana, Missoula , 1999 .
[199] Sandra K. Martin,et al. Forest carnivore conservation and management in the interior Columbia basin: issues and environmental correlates. , 1998 .
[200] Michigan.,et al. Toxicological profile for dichloropropenes , 2008 .
[201] R. Boone,et al. Relations among fishers, snow, and martens in California: results from small-scale spatial comparisons , 1997 .
[202] S. Côté. Mountain goat responses to helicopter disturbance , 1996 .
[203] J. Berger,et al. Winter recreation and hibernating black bears Ursus americanus , 1994 .
[204] L. Jack Lyon,et al. The Scientific basis for conserving forest carnivores : American marten, fisher, lynx, and wolverine in the western United States / , 1994 .
[205] E. F. Cassirer,et al. ELK RESPONSES TO DISTURBANCE BY CROSS-COUNTRY SKIERS IN YELLOWSTONE NATIONAL PARK , 1992 .
[206] G. Koehler,et al. Managing spruce-fir habitat for lynx and snowshoe hare. , 1990 .
[207] James A. Baker,et al. Wild furbearer management and conservation in North America , 1987 .
[208] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[209] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[210] Keith E. Aune. Impacts of winter recreationists on wildlife in a portion of Yellowstone National Park, Wyoming , 1981 .
[211] Montana.,et al. Mountain goat habitat management plan for the Cabinet Mountains, Montana / , 1980 .
[212] Donald Gustafson,et al. Fuzzy clustering with a fuzzy covariance matrix , 1978, 1978 IEEE Conference on Decision and Control including the 17th Symposium on Adaptive Processes.
[213] L. Mech,et al. The Wolf: The Ecology and Behavior of an Endangered Species , 1970 .