| 1 |
LI H , GIGER M L . Chapter 15 artificial intelligence and interpretations in breast cancer imaging. Artificial Intelligence in Medicine, 2021, 32, 291- 308.
|
| 2 |
LECUN Y , BENGIO Y , HINTON G . Deep learning. Nature, 2015, 521 (7553): 436- 444.
doi: 10.1038/nature14539
|
| 3 |
SAHA S , AHMAD T . Federated transfer learning: concept and applications. Intelligenza Artificiale, 2021, 15 (1): 35- 44.
doi: 10.3233/IA-200075
|
| 4 |
牛淑芬, 刘文科, 陈俐霞, 等. 基于代理重加密的电子病历数据共享方案. 计算机工程, 2021, 47 (6): 164- 171.
doi: 10.19678/j.issn.1000-3428.0058229
|
|
NIU S F , LIU W K , CHEN L X , et al. Electronic medical record data sharing scheme based on proxy re-encryption. Computer Engineering, 2021, 47 (6): 164- 171.
doi: 10.19678/j.issn.1000-3428.0058229
|
| 5 |
LU R X , LIN X D , SHEN X M . SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Transactions on Parallel and Distributed Systems, 24 (3): 614- 624.
doi: 10.1109/TPDS.2012.146
|
| 6 |
张洪磊, 李浥东, 邬俊, 等. 基于隐私保护的联邦推荐算法综述. 自动化学报, 2022, 48 (9): 2142- 2163.
|
|
ZHANG H L , LI Y D , WU J , et al. A review of federated recommendation algorithms based on privacy protection. Acta Automatica Sinica, 2022, 48 (9): 2142- 2163.
|
| 7 |
MISHRA D K , KORIA N , KAPOOR N . A secure multi-party computation protocol for malicious computation prevention for preserving privacy during data mining. Computer Science, 2009, 3 (1): 35- 44.
|
| 8 |
ACAR A , AKSU H , ULUAGAC A S , et al. A survey on homomorphic encryption schemes. ACM Computing Surveys, 2019, 51 (4): 1- 35.
|
| 9 |
BONAWITZ K, IVANOV V, KREUTER B, et al. Practical secure aggregation for privacy-preserving machine learning[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2017: 1175-1191.
|
| 10 |
PHONG L T , AONO Y , HAYASHI T , et al. Privacy-preserving deep learning via additively homomorphic encryption. IEEE Transactions on Information Forensics and Security, 2018, 13 (5): 1333- 1345.
doi: 10.1109/TIFS.2017.2787987
|
| 11 |
MA X , ZHANG F G , CHEN X F , et al. Privacy preserving multi-party computation delegation for deep learning in cloud computing. Information Sciences, 2018, 459, 103- 116.
doi: 10.1016/j.ins.2018.05.005
|
| 12 |
FANG C , GUO Y B , HU Y J , et al. Privacy-preserving and communication-efficient federated learning in Internet of things. Computers & Security, 2021, 103, 102199.
|
| 13 |
史加荣, 王丹, 尚凡华. 随机梯度下降算法研究进展. 自动化学报, 2021, 47 (9): 2103- 2119.
|
|
SHI J R , WANG D , SHANG F H . Research progress of stochastic gradient descent algorithm. Acta Automatica Sinica, 2021, 47 (9): 2103- 2119.
|
| 14 |
ALI A , PASHA M F , ALI J , et al. Deep learning based homomorphic secure search-able encryption for keyword search in blockchain healthcare system: a novel approach to cryptography. Sensors, 2022, 22 (2): 528.
doi: 10.3390/s22020528
|
| 15 |
DUAN J , ZHOU J T , LI Y M , et al. Privacy-preserving and verifiable deep learning inference based on secret sharing. Neurocomputing, 2022, 483, 221- 234.
doi: 10.1016/j.neucom.2022.01.061
|
| 16 |
KUAI H Z , ZHONG N , CHEN J H , et al. Multi-source brain computing with systematic fusion for smart health. Information Fusion, 2021, 75, 150- 167.
doi: 10.1016/j.inffus.2021.03.009
|
| 17 |
邢丹丹, 曹素珍, 赵晓, 等. 车联网环境下多接收者匿名签密方案. 计算机工程, 2024, 50 (10): 205- 215.
doi: 10.19678/j.issn.1000-3428.0068383
|
|
XING D D , CAO S Z , ZHAO X , et al. Multi-receiver anonymous signcryption scheme in IoV. Computer Engineering, 2024, 50 (10): 205- 215.
doi: 10.19678/j.issn.1000-3428.0068383
|
| 18 |
ABYANE A E , ZHU D R , SOUZA R , et al. Towards understanding quality challenges of the federated learning for neural networks: a first look from the lens of robustness. Empirical Software Engineering, 2023, 28 (2): 44.
doi: 10.1007/s10664-022-10262-y
|
| 19 |
DAMGÅRD I , JURIK M . A generalisation, a simplification and some applications of paillier's probabilistic public-key system. Berlin, Germany: Springer, 2001.
|
| 20 |
RIVEST R L , SHAMIR A , ADLEMAN L . A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, 21 (2): 120- 126.
doi: 10.1145/359340.359342
|
| 21 |
ZHANG L , XU J B , VIJAYAKUMAR P , et al. Homomorphic encryption-based privacy-preserving federated learning in IoT-enabled healthcare system. IEEE Transactions on Network Science and Engineering, 2023, 10 (5): 2864- 2880.
doi: 10.1109/TNSE.2022.3185327
|
| 22 |
LIU X Y , LI H W , XU G W , et al. Privacy-enhanced federated learning against poisoning adversaries. IEEE Transactions on Information Forensics and Security, 2021, 16, 4574- 4588.
doi: 10.1109/TIFS.2021.3108434
|
| 23 |
史志生. 联邦学习中的隐私保护技术研究[D]. 成都: 电子科技大学, 2023.
|
|
SHI Z S. Research on privacy protection technology in federated learning[D]. Chengdu: University of Electronic Science and Technology, 2023. (in Chinese)
|