相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Privacy-Preserving Object Detection for Medical Images With Faster R-CNN
Yang Liu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions
Minghui Li et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning
Yang Liu et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)
SOCI: A Toolkit for Secure Outsourced Computation on Integers
Bowen Zhao et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)
Garbled Circuits with Sublinear Evaluator
Abida Haque et al.
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I (2022)
SE-VFC: Secure and Efficient Outsourcing Computing in Vehicular Fog Computing
Xuejiao Liu et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)
Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication
Kelong Cong et al.
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2021)
AsySQN: Faster Vertical Federated Learning Algorithms with Better Computation Resource Utilization
Qingsong Zhang et al.
KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING (2021)
Oblivious Key-Value Stores and Amplification for Private Set Intersection
Gayathri Garimella et al.
ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II (2021)
Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits
Mike Rosulek et al.
ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I (2021)
Faster unbalanced Private Set Intersection in the semi-honest setting
Amanda Cristina Davi Resende et al.
JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2021)
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning
Harsh Chaudhari et al.
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) (2020)
Efficient Delegated Private Set Intersection on Outsourced Private Datasets
Aydin Abadi et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)
Efficient Circuit-Based PSI with Linear Communication
Benny Pinkas et al.
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III (2019)
Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties
Ye Li et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
Scalable Private Set Intersection Based on OT Extension
Benny Pinkas et al.
ACM TRANSACTIONS ON PRIVACY AND SECURITY (2018)
Fast Secure Computation for Small Population over the Internet
Megha Byali et al.
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)
PIR with compressed queries and amortized query processing
Sebastian Angel et al.
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)
Scalable Multi-party Private Set-Intersection
Carmit Hazay et al.
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT I (2017)
Efficient Batched Oblivious PRF with Applications to Private Set Intersection
Vladimir Kolesnikov et al.
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
MORE ROBUST HASHING: CUCKOO HASHING WITH A STASH
Adam Kirsch et al.
SIAM JOURNAL ON COMPUTING (2009)