X-Secure T-Private Federated Submodel Learning
暂无分享,去创建一个
[1] Shaojie Tang,et al. Secure Federated Submodel Learning , 2019, ArXiv.
[2] Vitaly Shmatikov,et al. How To Backdoor Federated Learning , 2018, AISTATS.
[3] Hua Sun,et al. The Capacity of Private Information Retrieval , 2017, IEEE Transactions on Information Theory.
[4] Sennur Ulukus,et al. The Capacity of Private Information Retrieval from Decentralized Uncoded Caching Databases , 2019, Inf..
[5] Sennur Ulukus,et al. The Capacity of Private Information Retrieval from Byzantine and Colluding Databases , 2017, IEEE Transactions on Information Theory.
[6] Ravi Tandon,et al. The capacity of cache aided private information retrieval , 2017, 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[7] Camilla Hollanti,et al. Private information retrieval schemes for codec data with arbitrary collusion patterns , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[8] Anit Kumar Sahu,et al. Federated Learning: Challenges, Methods, and Future Directions , 2019, IEEE Signal Processing Magazine.
[9] Chao Tian,et al. Capacity-Achieving Private Information Retrieval Codes from MDS-Coded Databases with Minimum Message Size , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).
[10] Rafail Ostrovsky,et al. Distributed Oblivious RAM for Secure Two-Party Computation , 2013, TCC.
[11] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[12] V. Pan. Structured Matrices and Polynomials: Unified Superfast Algorithms , 2001 .
[13] Mahdi Jafari Siavoshani,et al. Multi-Message Private Information Retrieval with Private Side Information , 2018, 2018 IEEE Information Theory Workshop (ITW).
[14] Syed Ali Jafar,et al. The Capacity of Private Information Retrieval with Private Side Information , 2017, ArXiv.
[15] Camilla Hollanti,et al. Private Information Retrieval from Coded Databases with Colluding Servers , 2016, SIAM J. Appl. Algebra Geom..
[16] Wonjae Shin,et al. Private Information Retrieval for Secure Distributed Storage Systems , 2018, IEEE Transactions on Information Forensics and Security.
[17] Sennur Ulukus,et al. Multi-Message Private Information Retrieval: Capacity Results and Near-Optimal Schemes , 2017, IEEE Transactions on Information Theory.
[18] Syed Ali Jafar,et al. On the Asymptotic Capacity of X-Secure T-Private Information Retrieval With Graph-Based Replicated Storage , 2019, IEEE Transactions on Information Theory.
[19] Hua Sun,et al. Private Information Retrieval from MDS Coded Data With Colluding Servers: Settling a Conjecture by Freij-Hollanti et al. , 2018, IEEE Transactions on Information Theory.
[20] Tianjian Chen,et al. Federated Machine Learning: Concept and Applications , 2019 .
[21] Hua Sun,et al. The Capacity of Private Computation , 2018, 2018 IEEE International Conference on Communications (ICC).
[22] Syed A. Jafar,et al. X-Secure T-Private Information Retrieval From MDS Coded Storage With Byzantine and Unresponsive Servers , 2019, IEEE Transactions on Information Theory.
[23] Syed Ali Jafar,et al. The Asymptotic Capacity of Private Search , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).
[24] Mikael Skoglund,et al. The Capacity of Private Information Retrieval with Eavesdroppers , 2018, 2018 52nd Asilomar Conference on Signals, Systems, and Computers.
[25] Hua Sun,et al. The Capacity of Symmetric Private Information Retrieval , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[26] Eyal Kushilevitz,et al. Sub-logarithmic Distributed Oblivious RAM with Small Block Size , 2019, IACR Cryptol. ePrint Arch..
[27] Sennur Ulukus,et al. Private Set Intersection: A Multi-Message Symmetric Private Information Retrieval Perspective , 2021, IEEE Transactions on Information Theory.
[28] Georg Heinig,et al. An inversion formula and fast algorithms for Cauchy-Vandermonde matrices , 1993 .
[29] M. Gasca,et al. Computation of rational interpolants with prescribed poles , 1989 .
[30] Hua Sun,et al. Cross Subspace Alignment and the Asymptotic Capacity of $X$ -Secure $T$ -Private Information Retrieval , 2018, IEEE Transactions on Information Theory.
[31] Mikael Skoglund,et al. Secure Private Information Retrieval from Colluding Databases with Eavesdroppers , 2017, 2018 IEEE International Symposium on Information Theory (ISIT).
[32] Mikael Skoglund,et al. Linear symmetric private information retrieval for MDS coded distributed storage with colluding servers , 2017, 2017 IEEE Information Theory Workshop (ITW).
[33] Sennur Ulukus,et al. Fundamental Limits of Cache-Aided Private Information Retrieval With Unknown and Uncoded Prefetching , 2017, IEEE Transactions on Information Theory.
[34] Deepak Kumar,et al. The Capacity of Private Information Retrieval From Uncoded Storage Constrained Databases , 2018, IEEE Transactions on Information Theory.
[35] Michael Gastpar,et al. Single-server Multi-user Private Information Retrieval with Side Information , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).
[36] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[37] Hua Sun,et al. The Capacity of Symmetric Private Information Retrieval , 2019, IEEE Transactions on Information Theory.
[38] Hua Sun,et al. Multiround Private Information Retrieval: Capacity and Storage Overhead , 2016, IEEE Transactions on Information Theory.
[39] Syed A. Jafar,et al. Double Blind T-Private Information Retrieval , 2020, IEEE Journal on Selected Areas in Information Theory.
[40] Jungwoo Lee,et al. Information-Theoretic Privacy in Federated Submodel learning , 2020, ICT Express.
[41] Mikael Skoglund,et al. The $\epsilon$-error Capacity of Symmetric PIR with Byzantine Adversaries , 2018 .
[42] Vitaly Feldman,et al. Privacy Amplification by Iteration , 2018, 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS).
[43] H. Brendan McMahan,et al. Learning Differentially Private Recurrent Language Models , 2017, ICLR.
[44] Richard Nock,et al. Advances and Open Problems in Federated Learning , 2021, Found. Trends Mach. Learn..
[45] Nan Liu,et al. The Capacity of Multi-round Private Information Retrieval from Byzantine Databases , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).
[46] Chao Tian,et al. Capacity-Achieving Private Information Retrieval Codes With Optimal Message Size and Upload Cost , 2018, IEEE Transactions on Information Theory.
[47] Camilla Hollanti,et al. Private Information Retrieval From Coded Storage Systems With Colluding, Byzantine, and Unresponsive Servers , 2018, IEEE Transactions on Information Theory.
[48] Hua Sun,et al. The Capacity of Robust Private Information Retrieval With Colluding Databases , 2016, IEEE Transactions on Information Theory.
[49] Blaise Agüera y Arcas,et al. Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.
[50] Sennur Ulukus,et al. The Capacity of Private Information Retrieval With Partially Known Private Side Information , 2019, IEEE Transactions on Information Theory.
[51] Mahtab Mirmohseni,et al. Private function retrieval , 2017, 2018 Iran Workshop on Communication and Information Theory (IWCIT).
[52] Mikael Skoglund,et al. The ϵ-error Capacity of Symmetric PIR with Byzantine Adversaries , 2018, 2018 IEEE Information Theory Workshop (ITW).
[53] Sennur Ulukus,et al. The Capacity of Private Information Retrieval From Heterogeneous Uncoded Caching Databases , 2019, IEEE Transactions on Information Theory.