FedPerm: Private and Robust Federated Learning by Parameter Permutation Authors: Hamid Mozaffari, Virendra J. Marathe, Dave Dice | Published: 2022-08-16 プライバシーリスク管理ポイズニング通信効率 2022.08.16 2025.04.03 文献データベース
Practical Vertical Federated Learning with Unsupervised Representation Learning Authors: Zhaomin Wu, Qinbin Li, Bingsheng He | Published: 2022-08-13 データ保護手法プライバシーリスク管理通信効率 2022.08.13 2025.04.03 文献データベース
Efficient and Privacy Preserving Group Signature for Federated Learning Authors: Sneha Kanchan, Jae Won Jang, Jun Yong Yoon, Bong Jun Choi | Published: 2022-07-12 | Updated: 2022-07-15 グループ署名ポイズニング通信効率 2022.07.12 2025.04.03 文献データベース
Secure Aggregation for Federated Learning in Flower Authors: Kwing Hei Li, Pedro Porto Buarque de Gusmão, Daniel J. Beutel, Nicholas D. Lane | Published: 2022-05-12 トレーニングプロトコル将来の研究通信効率 2022.05.12 2025.04.03 文献データベース
Fusion: Efficient and Secure Inference Resilient to Malicious Servers Authors: Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu | Published: 2022-05-06 | Updated: 2023-06-10 プライバシー保護技術攻撃手法通信効率 2022.05.06 2025.04.03 文献データベース
Federated Stochastic Primal-dual Learning with Differential Privacy Authors: Yiwei Li, Shuai Wang, Tsung-Hui Chang, Chong-Yung Chi | Published: 2022-04-26 プライバシー保護手法収束分析通信効率 2022.04.26 2025.04.03 文献データベース
Mitigating Leakage from Data Dependent Communications in Decentralized Computing using Differential Privacy Authors: Riad Ladjel, Nicolas Anciaux, Aurélien Bellet, Guillaume Scerri | Published: 2021-12-23 データ依存性プライバシー保護通信効率 2021.12.23 2025.04.03 文献データベース
Reputation-based PoS for the Restriction of Illicit Activities on Blockchain: Algorand Usecase Authors: Mayank Pandey, Rachit Agarwal, Sandeep Kumar Shukla, Nishchal Kumar Verma | Published: 2021-12-21 | Updated: 2022-08-25 ブロックチェーン技術犯罪行為検出通信効率 2021.12.21 2025.04.03 文献データベース
Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors Authors: Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near | Published: 2021-12-13 プライバシー侵害プロトコル性能評価通信効率 2021.12.13 2025.04.03 文献データベース
Does Fully Homomorphic Encryption Need Compute Acceleration? Authors: Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi | Published: 2021-12-13 | Updated: 2021-12-14 アルゴリズム設計メモリ管理手法通信効率 2021.12.13 2025.04.03 文献データベース