[1] |
杨强 . AI与数据隐私保护:联邦学习的破解之道[J]. 信息安全研究, 2019,5(11): 961-965.
|
|
YANG Q . AI and data privacy protection:the way to federated learning[J]. Journal of Information Security Research, 2019,5(11): 961-965.
|
[2] |
YANG Q , LIU Y , CHEN T J ,et al. Federated machine learning:concept and applications[J]. ACM Transactions on Intelligent Systems and Technology, 2019,10(2): 1-19.
|
[3] |
杨强, 童咏昕, 王晏晟 ,等. 群体智能中的联邦学习算法综述[J]. 智能科学与技术学报, 2022,4(1): 29-44.
|
|
YANG Q , TONG Y X , WANG Y S ,et al. A survey on federated learning in crowd intelligence[J]. Chinese Journal of Intelligent Science and Technology, 2022,4(1): 29-44.
|
[4] |
NASR M , SHOKRI R , HOUM ANSADR A . Comprehensive privacy analysis of deep learning:passive and active white-box inference attacks against centralized and federated learning[C]// Proceedings of 2019 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2019: 739-753.
|
[5] |
罗丹, 徐茹枝, 关志涛 . 物联网环境中基于深度学习的差分隐私预算优化方法[J]. 物联网学报, 2022,6(2): 65-76.
|
|
LUO D , XU R Z , GUAN Z T . Differential privacy budget optimization based on deep learning in IoT[J]. Chinese Journal on Internet of Things, 2022,6(2): 65-76.
|
[6] |
BARRENO M , NELSON B , SE ARS R ,et al. Can machine learning be secure?[C]// Proceedings of 2006 ACM Symposium on Information,Computer and Communications Security. New York:ACM Press, 2006: 16-25.
|
[7] |
BOUACIDA N , MOHAPATRA P . Vulnerabilities in federated learning[J]. IEEE Access, 2021,9: 63229-63249.
|
[8] |
LUO X J , WU Y C , XIAO X K ,et al. Feature inference attack on model predictions in vertical federated learning[C]// Proceedings of IEEE 37th International Conference on Data Engineering. Piscataway:IEEE Press, 2021: 181-192.
|
[9] |
LYU L J , YU H , YANG Q . Threats to federated learning:a survey[J]. arXiv preprint,2020,arXiv:02133.
|
[10] |
李宗育, 桂小林, 顾迎捷 ,等. 同态 加密技术及其在云计算隐私保护中的应用[J]. 软件学报, 2018,29(7): 1830-1851.
|
|
LI Z Y , GUI X L , GU Y J ,et al. Survey on homomorphic encryption algorithm and its application in the privacy-preserving for cloud computing[J]. Journal of Software, 2018,29(7): 1830-1851.
|
[11] |
李顺东, 窦家维, 王道顺 . 同态加密算法及其在云安全中的应用[J]. 计算机研究与发展, 2015,52(6): 1378-1388.
|
|
LI S D , DOU J W , WANG D S . Survey on homomorphic encryption and its applications to cloud security[J]. Journal of Computer Research and Development, 2015,52(6): 1378-1388.
|
[12] |
陈前昕, 毕仁万, 林劼 ,等. 支持多数不规则用户的隐私保护联邦学习框架[J]. 网络与信息安全学报, 2022,8(1): 139-150.
|
|
CHEN Q X , BI R W , LIN J ,et al. Privacypreserving federated learning framework with irregular-majority users[J]. Chinese Journal of Network and Information Security, 2022,8(1): 139-150.
|
[13] |
PATGIRI R , NAYAK S , MU PPALANENI N B . Is Bloom filter a bad choice for security and privacy?[C]// Proceedings of 2021 International Conference on Information Networking. Piscataway:IEEE Press, 2021: 648-653.
|
[14] |
BRODER A , MITZENMACHER M . Network applications of Bloom filters:a survey[J]. Internet Mathematics, 2004,1(4): 485-509.
|
[15] |
SELVARAJ S , SADASIVAM G S , GOUTHAM D T ,et al. Privacy preserving Bloom recommender system[C]// Proceedings of 2021 International Conference on Computer Communication and Informatics. Piscataway:IEEE Press, 2021: 1-6.
|