Author:
Wang Yang-tao,Liu Xin,Liu Shuo,Wang Ji,Peng Lu,Xu Gang,Chen Xiu-bo,Liu Xiao-meng
Publisher
Springer Nature Switzerland
Reference21 articles.
1. Yao, A.C.: Protocols for secure computation. In: Proceedings of the 23rd Annual Symposium on Foundation of Computer Science, Chicago, pp. 160–164 (1982)
2. Goldreich, O.: The Fundamental of Crytography: Basic Application. Cambridge University Press, London (2004)
3. Cramer, R., Damgard, I.B., Nielsen, J.B.: Secure Multiparty Compution. Cambridge University Press, London (2015)
4. Fu, A., Zhang, X., Xiong, N., et al.: VFL: a verifiable federated learning with privacy-preserving for big data in industrial IoT. IEEE Trans. Ind. Inform., 2513–2520 (2020)
5. Shen, H., Liu, Y., Xia, Z., et al.: An efficient aggregation scheme resisting on malicious data mining attacks for smart grid. Inf. Sci. 526, 289–300 (2020)