参考文献
[1]微众银行AI项目组. 联邦学习白皮书V1.0[M]. 深圳: 微众银行, 2018[2]Yao A. Protocols for secure computations[C] Proc of the 23rd Annual Symp on Foundations of Computer Science (FOCS). Piscataway, NJ: IEEE, 1982: 15[3]Garfinkel T, Pfaff B, Chow J, et al. Terra: A virtual machinebased platform for trusted computing[C] Proc of the 19th ACM Symp on Operating Systems Principles (SOSP). New York: ACM, 2003: 193206[4]Mcmahan H B, Moore E, Ramage D, et al. Communicationefficient learning of deep networks from decentralized data[J]. Artificial Intelligence and Statistics, 2017, 54(1): 12731282[5]Yang Q, Liu Y, Chen T, et al. Federated machine learning: Concept and applications[J]. ACM Trans on Intelligent Systems and Technology, 2019, 10(2): 119[6]闫树, 吕艾临. 隐私计算发展综述[J]. 信息通信技术与政策, 2021, 1(6): 111[7]Rabin M O. How to exchange secrets with oblivious transfer[J]. Technical Report (Harvard University), 2005, 187(1): 128[8]Yao C C. How to generate and exchange secrets[C] Proc of the Symp on Foundations of Computer Science (FOCS). Piscataway, NJ: IEEE, 2008: 162167[9]Goldwasser S, Micali S, Rackoff C. The Knowledge Complexity of Interactive ProofSystems[M]. New York: ACM, 2019[10]Beimel A. Secretsharing schemes: A survey[C] Proc of Int Conf on Coding and Cryptology. Berlin: Springer, 2011: 1146[11]Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and publickey cryptosystems[J]. Communications of the ACM, 1978, 21(2): 120126[12]朱天清, 何木青, 邹德清. 基于差分隐私的大数据隐私保护[J]. 信息安全研究, 2015, 1(3): 224229[13]王坤庆, 刘婧, 赵语杭, 等. 联邦学习安全威胁综述[J]. 信息安全研究, 2022, 8(3): 223234[14]邱晓慧, 杨波, 赵孟晨, 等. 联邦学习安全防御与隐私保护技术研究[J]. 计算机应用研究, 2022, 39(11): 113
|