Author:
Tian Haibo,Wen Yanchuan,Zhang Fangguo,Shao Yunfeng,Li Bingshuai
Publisher
Springer International Publishing
Reference40 articles.
1. Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B., Mironov, I., Talwar, K., Zhang, L.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. pp. 308–318. CCS 2016, Association for Computing Machinery, New York, NY, USA (2016). https://doi.org/10.1145/2976749.2978318
2. Al-Rubaie, M., Chang, J.M.: Reconstruction attacks against mobile-based continuous authentication systems in the cloud. IEEE Trans. Inf. Forensics Secur. 11(12), 2648–2663 (2016). https://doi.org/10.1109/TIFS.2016.2594132
3. Albrecht, M.,et al.: Homomorphic encryption security standard. Technical report, HomomorphicEncryption.org, Toronto, Canada, November 2018
4. Lecture Notes in Computer Science;G Asharov,2012
5. Lecture Notes in Computer Science;R Bendlin,2010
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献