Author:
Zhang Xiaoyu,Chen Chao,Xie Yi,Chen Xiaofeng,Zhang Jun,Xiang Yang
Funder
National Natural Science Foundation of China
Subject
Law,Hardware and Architecture,Software,General Computer Science,Computer Science Applications
Reference138 articles.
1. Data-driven cyber security in perspective—Intelligent traffic analysis;Coulter;IEEE Trans. Cybern.,2020
2. Boosting privately: Privacy-preserving federated extreme boosting for mobile crowdsensing;Liu,2019
3. Privacy-preserving object detection for medical images with faster R-CNN;Liu;IEEE Trans. Inf. Forensics Secur.,2019
4. Differentially private Byzantine-robust federated learning;Ma;IEEE Trans. Parallel Distrib. Syst.,2022
5. Key-policy attribute-based encryption with keyword search in virtualized environments;Yu;IEEE J. Sel. Areas Commun.,2020
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献