Author:
Chen Dong,Qiu Zhiyuan,Xu Guangwu
Publisher
Springer Nature Singapore
Reference38 articles.
1. Banner, R., Nahshan, Y., Soudry, D.: Post training 4-bit quantization of convolutional networks for rapid-deployment. In: Advances in Neural Information Processing Systems, vol. 32 (2019)
2. Barker, E., Barker, E., Burr, W., Polk, W., Smid, M., et al.: Recommendation for key management: Part 1: General. National Institute of Standards and Technology, Technology Administration (2006)
3. Beame, P.W., Cook, S.A., Hoover, H.J.: Log depth circuits for division and related problems. SIAM J. Comput. 15(4), 994–1003 (1986)
4. Bonawitz, K., et al.: Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1175–1191 (2017)
5. Cai, D., et al.: Accelerating vertical federated learning. CoRR abs/2207.11456 (2022). https://doi.org/10.48550/arXiv.2207.11456