ML Confidential: Machine Learning on Encrypted Data
暂无分享,去创建一个
[1] R. Fisher. THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .
[2] David G. Stork,et al. Pattern Classification , 1973 .
[3] Ronald L. Rivest,et al. Cryptography and Machine Learning , 1991, ASIACRYPT.
[4] R. Rivest,et al. Advances in Cryptology - ASIACRYPT '91: International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991. Proceedings , 1993 .
[5] John J. Cannon,et al. The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..
[6] David G. Stork,et al. Pattern Classification (2nd ed.) , 1999 .
[7] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[8] Michael I. Jordan,et al. On Spectral Clustering: Analysis and an algorithm , 2001, NIPS.
[9] T. Poggio,et al. General conditions for predictivity in learning theory , 2004, Nature.
[10] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[11] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[12] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[13] Frank McSherry,et al. Probabilistic Inference and Differential Privacy , 2010, NIPS.
[14] Chris Peikert,et al. Better Key Sizes (and Attacks) for LWE-Based Encryption , 2011, CT-RSA.
[15] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[16] Vinod Vaikuntanathan,et al. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.
[17] Zvika Brakerski,et al. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.
[18] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[19] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[20] Craig Gentry,et al. Better Bootstrapping in Fully Homomorphic Encryption , 2012, Public Key Cryptography.
[21] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[22] Damien Stehlé,et al. Hardness of decision (R)LWE for any modulus , 2012, IACR Cryptol. ePrint Arch..
[23] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.