Author:
Chen Chaochao,Zheng Fei,Cui Jamie,Cao Yuwei,Liu Guanfeng,Wu Jia,Zhou Jun
Funder
National Key Research and Development Program of China
Publisher
Springer Science and Business Media LLC
Reference196 articles.
1. Abadi M, Chu A, Goodfellow I et al (2016) Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 308–318
2. Ahmed S, Zaman A, Zhang Z et al (2019) Semi-order preserving encryption technique for numeric database. Int J Netw Comput 9(1):111–129
3. Ali A, Lepoint T, Patel S et al (2019) Communication-computation trade-offs in pir. IACR Cryptol ePrint Arch 2019:1483
4. Angel S, Chen H, Laine K et al (2018) Pir with compressed queries and amortized query processing. In: 2018 IEEE symposium on security and privacy (SP), pp 962–979
5. Angles R, Arenas M, Barceló P et al (2017) Foundations of modern query languages for graph databases. ACM Comput Surv (CSUR) 50:1–40
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献