Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Linguistics and Language,Language and Linguistics
Reference142 articles.
1. Araki T, Furukawa J, Lindell Y, Nof A, Ohara K (2016) High-throughput semi-honest secure three-party computation with an honest majority. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, https://doi.org/10.1145/2976749.2978331
2. Ács G, Castelluccia C (2011) I have a DREAM! (DiffeRentially privatE smArt metering). In Information Hiding, pages 118–132. Springer Berlin Heidelberg, https://doi.org/10.1007/978-3-642-24178-9_9
3. Bagdasaryan E, Veit A, Hua Y, Estrin D, Shmatikov V (2020) How to backdoor federated learning. In International Conference on Artificial Intelligence and Statistics, pp 2938–2948. PMLR
4. Baruch M, Baruch G, Goldberg Y (2019) A little is enough: Circumventing defenses for distributed learning. arXiv preprint arXiv:1902.06156
5. Berlioz A, Friedman A, Kaafar MA, Boreli R, Berkovsky S (2015) Applying differential privacy to matrix factorization. In Proceedings of the 9th ACM Conference on Recommender Systems. ACM, https://doi.org/10.1145/2792838.2800173
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献