Toward privacy-preserving diffusion strategies for adaptation and learning over networks
暂无分享,去创建一个
[1] Ali H. Sayed,et al. Diffusion LMS Strategies for Distributed Estimation , 2010, IEEE Transactions on Signal Processing.
[2] Keke Chen,et al. Under Consideration for Publication in Knowledge and Information Systems Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining , 2010 .
[3] Ali H. Sayed,et al. Diffusion strategies for adaptation and learning over networks: an examination of distributed strategies and network behavior , 2013, IEEE Signal Processing Magazine.
[4] Naren Ramakrishnan,et al. Privacy Risks in Recommender Systems , 2001, IEEE Internet Comput..
[5] Ali H. Sayed,et al. Fundamentals Of Adaptive Filtering , 2003 .
[6] Asuman E. Ozdaglar,et al. Distributed Subgradient Methods for Multi-Agent Optimization , 2009, IEEE Transactions on Automatic Control.
[7] Keke Chen,et al. Privacy preserving data classification with rotation perturbation , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[8] Ali H. Sayed,et al. Incremental Adaptive Strategies Over Distributed Networks , 2007, IEEE Transactions on Signal Processing.
[9] Pravesh Kothari,et al. 25th Annual Conference on Learning Theory Differentially Private Online Learning , 2022 .
[10] Yih-Fang Huang,et al. Analysis of a reduced-communication diffusion LMS algorithm , 2014, Signal Process..
[11] Qi Wang,et al. Random-data perturbation techniques and privacy-preserving data mining , 2005, Knowledge and Information Systems.
[12] Jie Chen,et al. Diffusion LMS Over Multitask Networks , 2014, IEEE Transactions on Signal Processing.
[13] Cédric Richard,et al. Multitask Diffusion Adaptation Over Asynchronous Networks , 2014, IEEE Transactions on Signal Processing.
[14] Jie Chen,et al. Multitask Diffusion Adaptation Over Networks , 2013, IEEE Transactions on Signal Processing.
[15] Arun Rajkumar,et al. A Differentially Private Stochastic Gradient Descent Algorithm for Multiparty Classification , 2012, AISTATS.
[16] Ali H. Sayed,et al. Diffusion Adaptation over Networks , 2012, ArXiv.
[17] Jie Chen,et al. Diffusion LMS over multitask networks with noisy links , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[18] Kun Liu,et al. A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods , 2008, Privacy-Preserving Data Mining.
[19] Ali H. Sayed,et al. Diffusion Adaptation Over Networks Under Imperfect Information Exchange and Non-Stationary Data , 2011, IEEE Transactions on Signal Processing.
[20] A. Tamilarasi,et al. Privacy Preserving Data Mining Based on , 2010 .
[21] 24th European Signal Processing Conference, EUSIPCO 2016, Budapest, Hungary, August 29 - September 2, 2016 , 2016, European Signal Processing Conference.
[22] Ali H. Sayed,et al. Adaptive Networks , 2014, Proceedings of the IEEE.
[23] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[24] Ali H. Sayed,et al. Diffusion Strategies Outperform Consensus Strategies for Distributed Estimation Over Adaptive Networks , 2012, IEEE Transactions on Signal Processing.
[25] Robert D. Nowak,et al. Quantized incremental algorithms for distributed optimization , 2005, IEEE Journal on Selected Areas in Communications.
[26] Keke Chen,et al. A Survey of Multiplicative Perturbation for Privacy-Preserving Data Mining , 2008, Privacy-Preserving Data Mining.