Privacy Preserving Implementation of the Max-Sum Algorithm and its Variants
暂无分享,去创建一个
[1] Boi Faltings,et al. Approximations in Distributed Optimization , 2005, CP.
[2] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[3] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[4] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[5] Sven Laur,et al. A New Protocol for Conditional Disclosure of Secrets and Its Applications , 2007, ACNS.
[6] Boi Faltings,et al. Secure Combinatorial Optimization Simulating DFS Tree-Based Variable Elimination , 2006, AI&M.
[7] Baruch Awerbuch,et al. New Connectivity and MSF Algorithms for Shuffle-Exchange Network and PRAM , 1987, IEEE Transactions on Computers.
[8] Robert N. Lass,et al. DCOPolis: a framework for simulating and deploying distributed constraint reasoning algorithms , 2008, AAMAS.
[9] Nicholas R. Jennings,et al. Decentralised coordination of continuously valued control parameters using the max-sum algorithm , 2009, AAMAS.
[10] Makoto Yokoo,et al. Algorithms for Distributed Constraint Satisfaction: A Review , 2000, Autonomous Agents and Multi-Agent Systems.
[11] Vitaly Shmatikov,et al. Privacy-Preserving Graph Algorithms in the Semi-honest Model , 2005, ASIACRYPT.
[12] Alan M. Frieze,et al. Random graphs , 2006, SODA '06.
[13] Steven Okamoto,et al. Explorative anytime local search for distributed constraint optimization , 2014, Artif. Intell..
[14] Marcel Keller,et al. Efficient, Oblivious Data Structures for MPC , 2014, IACR Cryptol. ePrint Arch..
[15] Javier Larrosa,et al. Improved Bounded Max-Sum for Distributed Constraint Optimization , 2012, CP.
[16] Weixiong Zhang,et al. Distributed stochastic search and distributed breakout: properties, comparison and applications to constraint optimization problems in sensor networks , 2005, Artif. Intell..
[17] Peeter Laud,et al. Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning Trees , 2015, Proc. Priv. Enhancing Technol..
[18] Roie Zivan,et al. Max/min-sum distributed constraint optimization through value propagation on an alternating DAG , 2012, AAMAS.
[19] Milind Tambe,et al. Privacy Loss in Distributed Constraint Reasoning: A Quantitative Framework for Analysis and its Applications , 2006, Autonomous Agents and Multi-Agent Systems.
[20] Richard S. Zemel,et al. HOP-MAP: Efficient Message Passing with High Order Potentials , 2010, AISTATS.
[21] Nicholas R. Jennings,et al. Max-sum decentralised coordination for sensor systems , 2008, AAMAS.
[22] Kobbi Nissim,et al. Secure DisCSP Protocols – From Centralized Towards Distributed Solutions , 2005 .
[23] Makoto Yokoo,et al. Adopt: asynchronous distributed constraint optimization with quality guarantees , 2005, Artif. Intell..
[24] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[25] Josh Benaloh,et al. Dense Probabilistic Encryption , 1999 .
[26] Abhi Shelat,et al. Collusion-Free Multiparty Computation in the Mediated Model , 2009, CRYPTO.
[27] Robert J. McEliece,et al. The generalized distributive law , 2000, IEEE Trans. Inf. Theory.
[28] Tamir Tassa,et al. Max-Sum Goes Private , 2015, IJCAI.
[29] Mathieu Van Vyve,et al. Securely Solving Simple Combinatorial Graph Problems , 2013, Financial Cryptography.
[30] Tamir Tassa,et al. P-SyncBB: A Privacy Preserving Branch and Bound DCOP Algorithm , 2016, J. Artif. Intell. Res..
[31] Makoto Yokoo,et al. Distributed Partial Constraint Satisfaction Problem , 1997, CP.
[32] Steven Okamoto,et al. Balancing exploration and exploitation in incomplete Min/Max-sum inference for distributed constraint optimization , 2017, Autonomous Agents and Multi-Agent Systems.
[33] Tal Grinshpoun,et al. When You Say (DCOP) Privacy, What do You Mean? - Categorization of DCOP Privacy and Insights on Internal Constraint Privacy , 2012, ICAART.
[34] Milind Tambe,et al. Distributed Algorithms for DCOP: A Graphical-Game-Based Approach , 2004, PDCS.
[35] Milind Tambe,et al. Engineering the Decentralized Coordination of UAVs with Limited Communication Range , 2013, CAEPIA.
[36] Milind Tambe,et al. Taking DCOP to the real world: efficient complete solutions for distributed multi-event scheduling , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[37] Yuval Ishai,et al. Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.
[38] Michael D. Smith,et al. SSDPOP: improving the privacy of DCOP with secret sharing , 2007, AAMAS '07.
[39] Nicholas R. Jennings,et al. Bounded approximate decentralised coordination via the max-sum algorithm , 2009, Artif. Intell..
[40] Moni Naor,et al. Computationally Secure Oblivious Transfer , 2004, Journal of Cryptology.
[41] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[42] Onn Shehory,et al. Agent-Oriented Software Engineering: Reflections on Architectures, Methodologies, Languages, and Frameworks , 2014 .
[43] Sarvapali D. Ramchurn,et al. Decentralized Coordination in RoboCup Rescue , 2010, Comput. J..
[44] Boi Faltings,et al. A Scalable Method for Multiagent Constraint Optimization , 2005, IJCAI.
[45] Amnon Meisels. Asynchronous Forward-Bounding , 2008 .
[46] Milind Tambe,et al. Analysis of Privacy Loss in Distributed Constraint Optimization , 2006, AAAI.
[47] Makoto Yokoo,et al. Secure distributed constraint satisfaction: reaching agreement without revealing private information , 2002, Artif. Intell..
[48] Nicholas R. Jennings,et al. Decentralised coordination of low-power embedded devices using the max-sum algorithm , 2008, AAMAS.
[49] Toby Walsh,et al. Using Auxiliary Variables and Implied Constraints to Model Non-Binary Problems , 2000, AAAI/IAAI.
[50] Makoto Yokoo,et al. Distributed Private Constraint Optimization , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[51] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[52] Tamir Tassa,et al. A privacy-preserving algorithm for distributed constraint optimization , 2014, AAMAS.
[53] Marius-Calin Silaghi,et al. Distributed constraint satisfaction and optimization with privacy enforcement , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..
[54] Amnon Meisels,et al. AgentZero: A Framework for Simulating and Evaluating Multi-agent Algorithms , 2014, Agent-Oriented Software Engineering.
[55] Abhi Shelat,et al. Collusion-Free Protocols in the Mediated Model , 2008, CRYPTO.
[56] Boi Faltings,et al. Protecting Privacy through Distributed Computation in Multi-agent Decision Making , 2013, J. Artif. Intell. Res..
[57] Richard E. Overill,et al. Foundations of Cryptography: Basic Tools , 2002, J. Log. Comput..
[58] Amnon Meisels,et al. Asymmetric Distributed Constraint Optimization Problems , 2013, J. Artif. Intell. Res..