[PDF][PDF] 机器学习隐私保护研究综述
谭作文, 张连福 - 软件学报, 2020 - jos.org.cn
机器学习隐私保护研究综述隐私保护研究综述 Page 1 软件学报ISSN 1000-9825,CODEN
RUXUEW Journal of Software,[doi: 10.13328/j.cnki.jos.00 ©中国科学院软件研究所版权所有 …
RUXUEW Journal of Software,[doi: 10.13328/j.cnki.jos.00 ©中国科学院软件研究所版权所有 …
Conclave: secure multi-party computation on big data
N Volgushev, M Schwarzkopf, B Getchell… - Proceedings of the …, 2019 - dl.acm.org
Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint
computations without revealing private data. Current MPC algorithms scale poorly with data …
computations without revealing private data. Current MPC algorithms scale poorly with data …
Survey on privacy preserving techniques for machine learning
谭作文, 张连福 - Journal of Software, 2020 - jos.org.cn
机器学习隐私保护研究综述 隐私保护研究综述 Page 1 软件学报 ISSN 1000-9825,CODEN
RUXUEW Journal of Software,[doi: 10.13328/j.cnki.jos.00 ©中国科学院软件研究所版权所有 …
RUXUEW Journal of Software,[doi: 10.13328/j.cnki.jos.00 ©中国科学院软件研究所版权所有 …
[PDF][PDF] Optimal load-balanced scalable distributed agreement
Y Gelles, I Komargodski - Proceedings of the 56th Annual ACM …, 2024 - dl.acm.org
We consider the fundamental problem of designing classical consensus-related distributed
abstractions for large-scale networks, where the number of parties can be huge. Specifically …
abstractions for large-scale networks, where the number of parties can be huge. Specifically …
Breaking the O (√ n)-bit barrier: Byzantine agreement with polylog bits per party
Byzantine agreement (BA), the task of n parties to agree on one of their input bits in the face
of malicious agents, is a powerful primitive that lies at the core of a vast range of distributed …
of malicious agents, is a powerful primitive that lies at the core of a vast range of distributed …
Brief announcement: Scalable agreement protocols with optimal optimistic efficiency
Y Gelles, I Komargodski - 37th International Symposium on …, 2023 - drops.dagstuhl.de
Designing efficient distributed protocols for various agreement tasks such as Byzantine
Agreement, Broadcast, and Committee Election is a fundamental problem. We are interested …
Agreement, Broadcast, and Committee Election is a fundamental problem. We are interested …
ePMLF: Efficient and Privacy‐Preserving Machine Learning Framework Based on Fog Computing
R Zhao, Y Xie, H Cheng, X Jia… - International Journal of …, 2023 - Wiley Online Library
With the continuous improvement of computation and communication capabilities, the
Internet of Things (IoT) plays a vital role in many intelligent applications. Therefore, IoT …
Internet of Things (IoT) plays a vital role in many intelligent applications. Therefore, IoT …
Privacy-Enhancing Technologies for Financial Data Sharing
Today, financial institutions (FIs) store and share consumers' financial data for various
reasons such as offering loans, processing payments, and protecting against fraud and …
reasons such as offering loans, processing payments, and protecting against fraud and …
Must the communication graph of MPC protocols be an expander?
Secure multiparty computation (MPC) on incomplete communication networks has been
studied within two primary models:(1) where a partial network is fixed a priori, and thus …
studied within two primary models:(1) where a partial network is fixed a priori, and thus …
Multi-party computation review for secure data processing in IoT-fog computing environment
BK Mohanta, D Jena… - International Journal of …, 2020 - inderscienceonline.com
In the last decade internet of things (IoT) technology becomes useful in almost every
application fields. IoT-cloud-based architecture is insufficient to handle the requirement of …
application fields. IoT-cloud-based architecture is insufficient to handle the requirement of …