咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 4 篇 计算机科学与技术...
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 2 篇 网络空间安全
    • 1 篇 轻工技术与工程
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 7 篇 privacy-preservi...
  • 2 篇 oblivious transf...
  • 2 篇 secure multi-par...
  • 2 篇 federated learni...
  • 2 篇 garbled circuits
  • 2 篇 secret sharings
  • 1 篇 noise-label lear...
  • 1 篇 deep learning
  • 1 篇 bloom filter
  • 1 篇 intellectual pro...
  • 1 篇 secure two-party...
  • 1 篇 distributed mach...
  • 1 篇 membership infer...
  • 1 篇 model outsourcin...
  • 1 篇 decision tree
  • 1 篇 domain adaptatio...
  • 1 篇 edge intelligenc...
  • 1 篇 decentralized le...
  • 1 篇 security
  • 1 篇 edge computing

机构

  • 1 篇 canadian institu...
  • 1 篇 hong kong univer...
  • 1 篇 state key labora...
  • 1 篇 university of ab...
  • 1 篇 department of au...
  • 1 篇 university of su...
  • 1 篇 college of infor...
  • 1 篇 school of comput...
  • 1 篇 state key labora...
  • 1 篇 university of ma...
  • 1 篇 state key labora...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 webank shenzhen ...
  • 1 篇 state key labora...
  • 1 篇 shanghai jiao to...

作者

  • 2 篇 kang yang
  • 2 篇 dengguo feng
  • 1 篇 xin ge
  • 1 篇 jian han lim
  • 1 篇 jiang xu
  • 1 篇 junjun jiang
  • 1 篇 shiyi lin
  • 1 篇 yuehua huang
  • 1 篇 jiankuo dong
  • 1 篇 songnian zhang
  • 1 篇 ding sheng ong
  • 1 篇 sean lalla
  • 1 篇 qiang yang
  • 1 篇 kam woh ng
  • 1 篇 rongxing lu
  • 1 篇 zhenjiang dong
  • 1 篇 lixin fan
  • 1 篇 xiangyang ji
  • 1 篇 bowen li
  • 1 篇 yunguo guan

语言

  • 7 篇 英文
检索条件"主题词=Privacy-Preserving Machine Learning"
7 条 记 录,以下是1-10 订阅
排序:
EG-STC: An Efficient Secure Two-Party Computation Scheme Based on Embedded GPU for Artificial Intelligence Systems
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 4021-4044页
作者: Zhenjiang Dong Xin Ge Yuehua Huang Jiankuo Dong Jiang Xu School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210023China School of Computer Nanjing University of Information Science and TechnologyNanjing210044China
This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of *** delve into... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Overhead-free Noise-tolerant Federated learning: A New Baseline
收藏 引用
machine Intelligence Research 2024年 第3期21卷 526-537页
作者: Shiyi Lin Deming Zhai Feilong Zhang Junjun Jiang Xianming Liu Xiangyang Ji Department of Computer Science and Technology Harbin Institute of TechnologyHarbin150000China Department of Automation Tsinghua UniversityBeijing100084China
Federated learning (FL) is a promising decentralized machine learning approach that enables multiple distributed clients to train a model jointly while keeping their data private. However, in real-world scenarios, the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
BloomDT-An improved privacy-preserving decision tree inference scheme
收藏 引用
Journal of Information and Intelligence 2024年 第2期2卷 130-147页
作者: Sean Lalla Rongxing Lu Yunguo Guan Songnian Zhang Canadian Institute for Cybersecurity(CIC) Faculty of Computer ScienceUniversity of New Brunswick(UNB)Fredericton E3B 5A3Canada
Outsourcing decision tree models to cloud servers can allow model providers to distribute their models at scale without purchasing dedicated hardware for model ***,model providers may be forced to disclose private mod... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Federated learning with privacy-preserving and Model IP-right-protection
收藏 引用
machine Intelligence Research 2023年 第1期20卷 19-37页
作者: Qiang Yang Anbu Huang Lixin Fan Chee Seng Chan Jian Han Lim Kam Woh Ng Ding Sheng Ong Bowen Li WeBank Shenzhen 518057China Hong Kong University of Science and Technology Hong Kong 999077China University of Malaya Kuala Lumpur 50603Malaysia University of Surrey Guildford GU27XHUK University of Aberystwyth Wales SY233DDUK Shanghai Jiao Tong University Shanghai 200240China
In the past decades,artificial intelligence(AI)has achieved unprecedented success,where statistical models become the central entity in ***,the centralized training and inference paradigm for building and using these ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Concretely efficient secure multi-party computation protocols: survey and more
收藏 引用
Security and Safety 2022年 第1期1卷 48-90页
作者: Dengguo Feng Kang Yang State Key Laboratory of Cryptology State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences
Secure multi-party computation(MPC) allows a set of parties to jointly compute a function on their private inputs, and reveals nothing but the output of the function. In the last decade, MPC has rapidly moved from a p... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Defense against Membership Inference Attack Applying Domain Adaptation with Addictive Noise
收藏 引用
Journal of Computer and Communications 2021年 第5期9卷 92-108页
作者: Hongwei Huang College of Information Science and Technology Jinan University Guangzhou China
Deep learning can train models from a dataset to solve tasks. Although deep learning has attracted much interest owing to the excellent performance, security issues are gradually exposed. Deep learning may be prone to... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Concretely ecient secure multi-party computation protocols:survey and mor
收藏 引用
Security and Safety 2022年 第1期1卷 47-89页
作者: Dengguo Feng Kang Yang State Key Laboratory of Cryptology Beijing 100878China State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China
Secure multi-party computation(MPC)allows a set of parties to jointly compute a function on their private inputs,and reveals nothing but the output of the *** the last decade,MPC has rapidly moved from a purely theore... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论