暂无分享,去创建一个
Kai Chen | Qiang Yang | Leye Wang | Junxue Zhang | Di Chai | Lianzhi Fu | Qiang Yang | Junxue Zhang | Kai Chen | Leye Wang | Di Chai | Lianzhi Fu
[1] Fillia Makedon,et al. Using singular value decomposition approximation for collaborative filtering , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).
[2] Yi Mu,et al. Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization , 2019, IEEE Transactions on Services Computing.
[3] A. Rukhin. Matrix Variate Distributions , 1999, The Multivariate Normal Distribution.
[4] Jon Crowcroft,et al. Federated Principal Component Analysis , 2019, NeurIPS.
[5] Zhenguo Li,et al. Federated Meta-Learning with Fast Convergence and Efficient Communication , 2018, 1802.07876.
[6] Changqing Luo,et al. SecFact: Secure Large-scale QR and LU Factorizations , 2017, IEEE Transactions on Big Data.
[7] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[8] Peter Wiemer-Hastings,et al. Latent semantic analysis , 2004, Annu. Rev. Inf. Sci. Technol..
[9] Yang Liu,et al. Federated Learning , 2019, Synthesis Lectures on Artificial Intelligence and Machine Learning.
[10] Wenliang Du,et al. SVD-based collaborative filtering with privacy , 2005, SAC '05.
[11] Q. Guo,et al. An Efficient SVD-Based Method for Image Denoising , 2016, IEEE Transactions on Circuits and Systems for Video Technology.
[12] G. Stewart,et al. Reorthogonalization and stable algorithms for updating the Gram-Schmidt QR factorization , 1976 .
[13] Kai Chen,et al. Secure Federated Matrix Factorization , 2019, IEEE Intelligent Systems.
[14] Peter Richtárik,et al. Federated Learning: Strategies for Improving Communication Efficiency , 2016, ArXiv.
[15] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[16] Hyunsoo Yoon,et al. Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption , 2016, IACR Cryptol. ePrint Arch..
[17] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[18] István Hegedüs,et al. Fully distributed robust singular value decomposition , 2014, 14-th IEEE International Conference on Peer-to-Peer Computing.
[19] Stratis Ioannidis,et al. Privacy-preserving matrix factorization , 2013, CCS.
[20] Roksana Boreli,et al. Applying Differential Privacy to Matrix Factorization , 2015, RecSys.
[21] Sarvar Patel,et al. Practical Secure Aggregation for Federated Learning on User-Held Data , 2016, ArXiv.
[22] Gerald E. Plassman. A Survey of Singular Value Decomposition Methods and Performance Comparison of Some Available Serial Codes , 2013 .
[23] Yuanman Li,et al. Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF) , 2021, IEEE Transactions on Services Computing.
[24] Yehuda Lindell,et al. How To Simulate It - A Tutorial on the Simulation Proof Technique , 2016, IACR Cryptol. ePrint Arch..
[25] Blaise Agüera y Arcas,et al. Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.
[26] Yehuda Koren,et al. Matrix Factorization Techniques for Recommender Systems , 2009, Computer.
[27] Anand Rangarajan,et al. Image Denoising Using the Higher Order Singular Value Decomposition , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[28] Philip S. Yu,et al. Privacy-Preserving Singular Value Decomposition , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[29] Sheng Zhong,et al. Secure and Efficient Outsourcing of PCA-Based Face Recognition , 2020, IEEE Transactions on Information Forensics and Security.
[30] Simon Haykin,et al. GradientBased Learning Applied to Document Recognition , 2001 .