Author:
Mokry Laylon,Slife Paul,Bishop Patrick,Quiroz Jose,Guzzi Cooper,Chen Zhiyuan,Crainiceanu Adina,Needham Don
Reference22 articles.
1. Federated Machine Learning
2. Secure Multiparty Computation and Secret Sharing
3. Distributed privacy preserving k-means clustering with additive secret sharing
4. Privacy-preserving approach for sharing and processing intrusion alert data;do;2015 IEEE Tenth International Conference on Intelligent Sensors Sensor Networks and Information Processing (ISSNIP),2015
5. Differential privacy;dwork;International Colloquium on Automata Languages and Programming,2006
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing Layers: The Synergy of Mix Networks and Shamir's Secret Sharing in Onion Routing;2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT);2024-01-04
2. Lightweight Collaborative Inferencing for Real-Time Intrusion Detection in IoT Networks;2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles (SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta);2022-12