Author of the publication

Privacy-Preserving Deep Learning via Additively Homomorphic Encryption.

, , , , and . IEEE Trans. Inf. Forensics Secur., 13 (5): 1333-1345 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-Objective Diagnosis Method for Gearbox: Multi Task Deep Learning Based on One-Dimensional Convolution., , , and . iThings/GreenCom/CPSCom/SmartData, page 538-545. IEEE, (2019)A Generic yet Efficient Method for Secure Inner Product., , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 217-232. Springer, (2017)Privacy-Preserving Naive Bayes Classification Using Fully Homomorphic Encryption., , , , , and . ICONIP (4), volume 11304 of Lecture Notes in Computer Science, page 349-358. Springer, (2018)Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities., , , and . ICICS, volume 6476 of Lecture Notes in Computer Science, page 383-400. Springer, (2010)Cultural Information Resources Sharing: a review and empirical study in China.. Electron. Libr., 30 (6): 857-870 (2012)Exploration of Mechanical Principle Combined Curriculum Reform Based on Network Assisted Platform., , and . eLEOT, volume 299 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 170-176. Springer, (2019)Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups., , , , , and . Fundam. Informaticae, 126 (1): 103-119 (2013)A Secure Automobile Information Sharing System., , and . IoTPTS@AsiaCCS, page 19-26. ACM, (2015)POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity., , , , , and . ACM Conference on Computer and Communications Security, page 1684-1686. ACM, (2015)Privacy-Preserving Federated Learning for Detecting Fraudulent Financial Transactions in Japanese Banks., , , , , , , , , and 2 other author(s). J. Inf. Process., (2022)