[1] |
ZHOU Y , TUZEL O . Voxelnet:end-to-end learning for point cloud based 3d object detection[C]// The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2018: 4490-4499.
|
[2] |
REN S Q , HE K , GIRSHICK R ,et al. Faster R-CNN:towards real-time object detection with region proposal networks[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2015,39(6): 91-99.
|
[3] |
YANN L , BERNHARD B , JOHN S D ,et al. Backpropagation applied to handwritten zip code recognition[J]. Neural Computation, 1989,1(4): 541-551.
|
[4] |
XIONG J B , BI R W , SZHAO M F ,et al. Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles[J]. IEEE Wireless Communications, 2020,27(3): 24-30.
|
[5] |
HESAMIFARD E , TAKABI H , GHASEMI M . CryptoDL:deep neural networks over encrypted data[J]. arXiv preprint arXiv:1711.05189, 2017
|
[6] |
MOHASSEL P , ZHANG Y P . SecureML:a system for scalable privacy-preserving machine learning[C]// IEEE Symposium on Security and Privacy (S&P). 2017: 19-38.
|
[7] |
YAO A C , . Protocols for secure computations[C]// The 23rd Annual Symposium on Foundations of Computer Science (SFCS). 1982: 160-164.
|
[8] |
唐春明, 魏伟明 . 基于安全两方计算的具有隐私性的回归算法[J]. 信息网络安全, 2018(10): 10-16.
|
|
TANG C M , WEI W M . Regression algorithm with based on secure two-party computation[J]. Information Network Security, 2018(10): 10-16.
|
[9] |
RABIN M O . How to exchange secrets with oblivious transfer[J]. IACR Cryptology ePrint Archive, 2005:187.
|
[10] |
刘新, 李顺东, 陈振华 . 基本初等函数的保密云计算服务协议[J]. 计算机科学, 2015,42(10): 159-163.
|
|
LIU X , LI S D , CHEN Z H . Secure cloud computing service protocols of elementary functions[J]. Computer Science, 2015,42(10): 159-163.
|
[11] |
HUANG K , LIU X M , FU S J ,et al. A lightweight privacy-preserving CNN feature extraction framework for mobile sensing[J]. IEEE Transactions on Dependable and Secure Computing, 2019:1.
|
[12] |
MA Z , LIU Y , LIU X M ,et al. Privacy-preserving outsourced speech recognition for smart IoT devices[J]. IEEE Internet of Things Journal, 2019,6(5): 8406-8420.
|
[13] |
LIU Y , MA Z , LIU X M ,et al. Privacy-preserving object detection for medical images with Faster R-CNN[J]. IEEE Transactions on Information Forensics and Security, 2019:1.
|
[14] |
VOLDER J E . The cordic trigonometric computing technique[J]. IRE Transactions on Electronic Computers, 1959,8(3): 330-334.
|
[15] |
ZHU Y W , HUANG L S , YANG W ,et al. Three new approaches to privacy-preserving add to multiply protocol and its application[C]// The 2nd International Workshop on Knowledge Discovery and Data Mining. 2009: 554-558.
|
[16] |
李禾, 王述洋 . 关于除法的安全双方计算协议[J]. 计算机工程与应用, 2010,46(6): 86-88.
|
|
LI H , WANG S Y . Several secure two-party protocols of division[J]. Computer Engineering and Applications, 2010,46(6): 86-88.
|
[17] |
BOGDANOV D , LAUR S , WILLEMSON J . Sharemind:a framework for fast privacy-preserving computations[C]// European Symposium on Research in Computer Security. 2008: 192-206.
|
[18] |
BOGDANOV D , NIITSOO M , TOFT T ,et al. High-performance secure multi-party computation for data mining applications[J]. International Journal of Information Security, 2012,11(6): 403-418.
|