[1] |
NGUYEN K X , RYU T , ZHANG J ,et al. CoConv:learning dynamic cooperative convolution for image recognition[C]// Proceedings of 2021 IEEE International Conference on Multimedia and Expo. Piscataway:IEEE Press, 2021: 1-6.
|
[2] |
YANG Q , FU S , WANG H G ,et al. Machine-learning-enabled cooperative perception for connected autonomous vehicles:challenges and opportunities[J]. IEEE Network, 2021,35(3): 96-101.
|
[3] |
GUO J D , CARRILLO D , TANG S H ,et al. CoFF:cooperative spatial feature fusion for 3-D object detection on autonomous vehicles[J]. IEEE Internet of Things Journal, 2021,8(14): 11078-11087.
|
[4] |
XIONG J B , BI R W , TIAN Y L ,et al. Towards lightweight,privacy-preserving cooperative object classification for connected autonomous vehicles[J]. IEEE Internet of Things Journal, 3573,PP(99): 1.
|
[5] |
LIN L , LIAO X F , JIN H ,et al. Computation offloading toward edge computing[J]. Proceedings of the IEEE, 2019,107(8): 1584-1607.
|
[6] |
YANG S Z , GONG Z , YE K ,et al. EdgeCNN:convolutional neural network classification model with small inputs for edge computing[J]. arXiv Preprint,arXiv:1909.13522, 2019.
|
[7] |
WANG Y B , HONG K J , ZOU J ,et al. A CNN-based visual sorting system with cloud-edge computing for flexible manufacturing systems[J]. IEEE Transactions on Industrial Informatics, 2020,16(7): 4726-4735.
|
[8] |
WONG A , LIN Z Q , CHWYL B . AttoNets:compact and efficient deep neural networks for the edge via human-machine collaborative design[C]// Proceedings of 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops. Piscataway:IEEE Press, 2019: 684-693.
|
[9] |
HESAMIFARD E , TAKABI H , GHASEMI M ,et al. Privacy-preserving machine learning as a service[J]. Proceedings on Privacy Enhancing Technologies, 2018,2018(3): 123-142.
|
[10] |
GILAD-BACHRACH R , DOWLIN N , LAINE K ,et al. CryptoNets:applying neural networks to encrypted data with high throughput and accuracy[C]// Proceedings of the 33rd International Conference on Machine Learning. Saarland:DBLP, 2016: 201-210.
|
[11] |
CHOU E , BEAL J , LEVY D ,et al. Faster CryptoNets:leveraging sparsity for real-world encrypted inference[J]. arXiv Preprint,arXiv:1811.09953, 2018.
|
[12] |
AL-BADAWI A , JIN C , LIN J ,et al. Towards the AlexNet moment for homomorphic encryption:HCNN,the first homomorphic CNN on encrypted data with GPUs[J]. IEEE Transactions on Emerging Topics in Computing, 2021,9(3): 1330-1343.
|
[13] |
ZHANG Q C , YANG L T , CHEN Z K . Privacy preserving deep computation model on cloud for big data feature learning[J]. IEEE Transactions on Computers, 2016,65(5): 1351-1362.
|
[14] |
ROUHANI B D , RIAZI M S , KOUSHANFAR F . DeepSecure:scalable provably-secure deep learning[C]// Proceedings of 2018 55th ACM/ESDA/IEEE Design Automation Conference. Piscataway:IEEE Press, 2018: 1-6.
|
[15] |
LIU J , JUUTI M , LU Y ,et al. Oblivious neural network predictions via MiniONN transformations[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2017: 619-631.
|
[16] |
RIAZI M S , WEINERT C , TKACHENKO O ,et al. Chameleon:a hybrid secure computation framework for machine learning applications[C]// Proceedings of the 2018 on Asia Conference on Computer and Communications Security. New York:ACM Press, 2018: 707-721.
|
[17] |
HUANG K , LIU X M , FU S J ,et al. A lightweight privacy-preserving CNN feature extraction framework for mobile sensing[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(3): 1441-1455.
|
[18] |
熊金波, 毕仁万, 陈前昕 ,等. 边缘协作的轻量级安全区域建议网络[J]. 通信学报, 2020,41(10): 188-201.
|
|
XIONG J B , BI R W , CHEN Q X ,et al. Towards edge-collaborative,lightweight and secure region proposal network[J]. Journal on Communications, 2020,41(10): 188-201.
|
[19] |
WAGH S , GUPTA D , CHANDRAN N . SecureNN:3-party secure computation for neural network training[J]. Proceedings on Privacy Enhancing Technologies, 2019,2019(3): 26-49.
|
[20] |
WAGH S , TOPLE S , BENHAMOUDA F ,et al. Falcon:honest-majority maliciously secure framework for private deep learning[J]. Proceedings on Privacy Enhancing Technologies, 2021,2021(1): 188-208.
|
[21] |
HE K M , ZHANG X Y , REN S Q ,et al. Deep residual learning for image recognition[C]// Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE Press, 2016: 770-778.
|
[22] |
SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613.
|
[23] |
毕仁万, 陈前昕, 熊金波 ,等. 面向深度神经网络的安全计算协议设计方法[J]. 网络与信息安全学报, 2020,6(4): 130-139.
|
|
BI R W , CHEN Q X , XIONG J B ,et al. Design method of secure computing protocol for deep neural network[J]. Chinese Journal of Network and Information Security, 2020,6(4): 130-139.
|
[24] |
LIU Y , MA Z , LIU X M ,et al. Privacy-preserving object detection for medical images with faster R-CNN[J]. IEEE Transactions on Information Forensics and Security, 2022,17: 69-84.
|
[25] |
BOGDANOV D , NIITSOO M , TOFT T ,et al. High-performance secure multi-party computation for data mining applications[J]. International Journal of Information Security, 2012,11(6): 403-418.
|
[26] |
XIONG J B , BI R W , ZHAO M F ,et al. Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles[J]. IEEE Wireless Communications, 2020,27(3): 24-30.
|