[1] |
NESHENKO N , BOU-HARB E , CRICHIGNO J ,et al. Demystifying IoT security:an exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations[J]. IEEE Communications Surveys & Tutorials, 2019,21(3): 2702-2733.
|
[2] |
CVITI? I , PERAKOVI? D , PERI? ,et al. Novel approach for detection of IoT generated DDoS traffic[J]. Wireless Networks, 2021,27(3): 1573-1586.
|
[3] |
MOHAMMADI M , AL-FUQAHA A , SOROUR S ,et al. Deep learning for IoT big data and streaming analytics:a survey[J]. IEEE Communications Surveys & Tutorials, 2018,20(4): 2923-2960.
|
[4] |
陈立南, 刘阳, 马严 ,等. 基于统计的高效决策树分组分类算法[J]. 通信学报, 2014,35(Z1): 58-64.
|
|
CHEN L N , LIU Y , MA Y ,et al. Efficient-cutting packet classification algorithm based on the statistical decision tree[J]. Journal on Communications, 2014,35(Z1): 58-64.
|
[5] |
LI T , LI X , ZHONG X Y ,et al. Communication-efficient outsourced privacy-preserving classification service using trusted processor[J]. Information Sciences, 2019,505: 473-486.
|
[6] |
PINHEIRO A J , DE M BEZERRA J , BURGARDT C A P ,et al. Identifying IoT devices and events based on packet length from encrypted traffic[J]. Computer Communications, 2019,144: 8-17.
|
[7] |
STALLINGS W . Handling of personal information and deidentified,aggregated,and pseudonymized information under the California consumer privacy act[J]. IEEE Security & Privacy, 2020,18(1): 61-64.
|
[8] |
SHASTRI S , WASSERMAN M , CHIDAMBARAM V . GDPR anti-patterns[J]. Communications of the ACM, 2021,64(2): 59-65.
|
[9] |
QI A M , SHAO G S , ZHENG W T . Assessing China's cybersecurity law[J]. Computer Law & Security Review, 2018,34(6): 1342-1354.
|
[10] |
LIANG J W , QIN Z , XIAO S ,et al. Efficient and secure decision tree classification for cloud-assisted online diagnosis services[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(4): 1632-1644.
|
[11] |
BOST R , POPA R A , TU S ,et al. Machine learning classification over encrypted data[C]// Proceedings 2015 Network and Distributed System Security Symposium. VA:Internet Society, 2015: 4324-4325.
|
[12] |
WU D J , FENG T , NAEHRIG M ,et al. Privately evaluating decision trees and random forests[J]. Proceedings on Privacy Enhancing Technologies, 2016,2016(4): 335-355.
|
[13] |
TUENO A , KERSCHBAUM F , KATZENBEISSER S . Private evaluation of decision trees using sublinear cost[J]. Proceedings on Privacy Enhancing Technologies, 2019,2019(1): 266-286.
|
[14] |
刘琳岚, 高声荣, 舒坚 . 基于随机森林的链路质量预测[J]. 通信学报, 2019,40(4): 202-211.
|
|
LIU L L , GAO S R , SHU J . Link quality prediction based on random forest[J]. Journal on Communications, 2019,40(4): 202-211.
|
[15] |
CHEN X , ZHU C C , YIN J . Ensemble of decision tree reveals potential miRNA-disease associations[J]. PLoS Computational Biology, 2019,15(7): 1-24.
|
[16] |
李佳, 云晓春, 李书豪 ,等. 基于混合结构深度神经网络的 HTTP恶意流量检测方法[J]. 通信学报, 2019,40(1): 24-33.
|
|
LI J , YUN X C , LI S H ,et al. HTTP malicious traffic detection method based on hybrid structure deep neural network[J]. Journal on Communications, 2019,40(1): 24-33.
|
[17] |
LI F H , LI H , NIU B ,et al. Privacy computing:concept,computing framework,and future development trends[J]. Engineering, 2019,5(6): 1179-1192.
|
[18] |
RAN C . Security and composition of multiparty cryptographic protocols[J]. Journal of Cryptology, 2000,13(1): 143-202.
|
[19] |
BRAKERSKI Z , GENTRY C , VAIKUNTANATHAN V . Fully homomorphic encryption without bootstrapping[J]. ACM Transactions on Computation Theory, 2014,6(3): 1-36.
|
[20] |
DAMGARD I , GEISLERR M , KROIGAARD M . Efficient and secure comparison for on-line auctions[C]// 2007Australasian conference on information security and privacy. Berlin:Springer, 2007: 416-430.
|
[21] |
ERKIN Z , FRANZ M , GUAJARDO J ,et al. Privacy-preserving face recognition[C]// International Symposium on Privacy Enhancing Technologies Symposium. Berlin:Springer, 2009: 235-253.
|
[22] |
GOLDREICH O , MICALI S , WIGDERSON A . How to play any mental game,or a completeness theorem for protocols with honest majority[C]// Proceedings of the 19th Symposium on Theory of Computing. New York:ACM Press, 2019: 307-328.
|
[23] |
KOLESNIKOV V , SADEGHI A R , SCHNEIDER T . Improved garbled circuit building blocks and applications to auctions and computing minima[C]// International Conference on Cryptology and Network Security. Berlin:Springer, 2009: 1-20.
|
[24] |
BEAVER D , . Efficient multiparty protocols using circuit randomization[C]// Annual International Cryptology Conference. Berlin:Springer, 1991: 420-432.
|
[25] |
NAOR M , PINKAS B . Computationally secure oblivious transfer[J]. Journal of Cryptology, 2005,18(1): 1-35.
|
[26] |
ASHAROV G , LINDELL Y , SCHNEIDER T ,et al. More efficient oblivious transfer and extensions for faster secure computation[C]// 2013 ACM SIGSAC conference on Computer & communications security. New York:ACM Press, 2013: 535-548.
|