共 50 条
- [42] Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations COMPUTER JOURNAL, 2016, 59 (04): : 493 - 507
- [43] AQ2PNN: Enabling Two-party Privacy-Preserving Deep Neural Network Inference with Adaptive Quantization 56TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, MICRO 2023, 2023, : 628 - 640
- [44] Privacy preserving sequential pattern mining based on secure two-party computation PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1227 - +
- [45] Privacy preserving association rules mining based on secure two-party computation INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 969 - 975
- [47] On the Complexity of Two-Party Differential Privacy PROCEEDINGS OF THE 54TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '22), 2022, : 1392 - 1405
- [48] The Limits of Two-Party Differential Privacy 2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 81 - 90
- [49] Privacy-preserving clustering of data streams Tamkang Journal of Science and Engineering, 2010, 13 (03): : 349 - 358
- [50] The Research of Privacy-preserving Clustering Algorithm 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 324 - 327