1 |
耿艺宁,刘帅师,刘泰廷,等. 基于计算机视觉的行人检测技术综述[J]. 计算机应用, 2021, 41(S1): 43-50.
|
|
GENG Y N, LIU S S, LIU T Y, et al. Survey of pedestrian detection technology based on computer vision[J]. Journal of Computer Applications, 2021, 41(S1): 43-50.
|
2 |
LUO X Y, LI L, WAN H, et al. Phone Keypad Voice Recognition (PKVR): an integrated experiment for digital signal processing education[C]// Proceedings of the 2020 IEEE Frontiers in Education Conference. Piscataway: IEEE, 2020: 1-4. 10.1109/fie44824.2020.9273815
|
3 |
GUO Y Y, BI L, AHN E, et al. A spatiotemporal volumetric interpolation network for 4D dynamic medical image[C]// Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2020: 4725-4734. 10.1109/cvpr42600.2020.00478
|
4 |
徐占洋,郑克长. 云计算下基于改进遗传算法的聚类融合算法[J]. 计算机应用, 2018, 38(2): 458-463. 10.11772/j.issn.1001-9081.2017071749
|
|
XU Z Y, ZHEN K C. Clustering ensemble algorithm based on improved genetic algorithm in cloud computing[J]. Journal of Computer Applications, 2018, 38(2): 458-463. 10.11772/j.issn.1001-9081.2017071749
|
5 |
熊金波,毕仁万,陈前昕,等. 边缘协作的轻量级安全区域建议网络[J]. 通信学报, 2020, 41(10): 188-201.
|
|
XIONG J B, BI R W, CHEN Q X, et al. Towards edge-collaborative, lightweight and secure region proposal network[J]. Journal on Communications, 2020, 41(10): 188-201.
|
6 |
WONG J C. The Cambridge Analytica scandal changed the world — but it didn’t change Facebook[N/OL]. GuardianThe. (2019-03-18) [2021-10-12]..
|
7 |
HARWELL D. Thousands of zoom video calls left exposed on open web[N/OL]. The Washington Post. (2020-04-03) [2021-10-12]..
|
8 |
毕仁万,陈前昕,熊金波,等. 面向深度神经网络的安全计算协议设计方法[J]. 网络与信息安全学报, 2020, 6(4): 130-139. 10.11959/j.issn.2096-109x.2020050
|
|
BI R W, CHEN Q X, XIONG J B, et al. Design method of secure computing protocol for deep neural network[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 130-139. 10.11959/j.issn.2096-109x.2020050
|
9 |
XIE P T, BILENKO M, FINLEY T, et al. Crypto-nets: neural networks over encrypted data[EB/OL]. (2020-04-03) [2021-10-12]..
|
10 |
GILAD-BACHRACH R, DOWLIN N, LAINE K, et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy[C]// Proceedings of the 33rd International Conference on Machine Learning. New York: JMLR.org, 2016: 201-210.
|
11 |
CHABANNE H, DE WARGNY A, MILGRAM J, et al. Privacy-preserving classification on deep neural network[EB/OL]. (2017-03-24) [2021-10-12]..
|
12 |
BADAWI A AL, JIN C, LIN J, et al. Towards the AlexNet moment for homomorphic encryption: HCNN, the first homomorphic CNN on encrypted data with GPUs[J]. IEEE Transactions on Emerging Topics in Computing, 2021, 9(3): 1330-1343. 10.1109/tetc.2020.3014636
|
13 |
XIONG J B, BI R W, TIAN Y L, et al. Toward lightweight, privacy-preserving cooperative object classification for connected autonomous vehicles[J]. IEEE Internet of Things Journal, 2022, 9(4): 2787-2801. 10.1109/jiot.2021.3093573
|
14 |
ZHANG Q C, YANG L T, CHEN Z K. Privacy preserving deep computation model on cloud for big data feature learning[J]. IEEE Transactions on Computers, 2016, 65(5): 1351-1362. 10.1109/tc.2015.2470255
|
15 |
HESAMIFARD E, TAKABI H, GHASEMI M, et al. Privacy-preserving machine learning in cloud[C]// Proceedings of the 2017 Cloud Computing Security Workshop. New York: ACM, 2017: 39-43. 10.1145/3140649.3140655
|
16 |
BOURSE F, MINELLI M, MINIHOLD M, et al. Fast homomorphic evaluation of deep discretized neural networks[C]// Proceedings of the 2018 Annual International Cryptology Conference, LNCS 10993. Cham: Springer, 2018: 483-512.
|
17 |
LOU Q, FENG B, FOX G C, et al. Glyph: fast and accurately training deep neural networks on encrypted data[C/OL]// Proceedings of the 34th Conference on Neural Information Processing Systems. [2021-09-20].. 10.1109/iconip.2002.1198214
|
18 |
BRAKERSKI Z, VAIKUNTANATHAN V. Efficient fully homomorphic encryption from (standard) LWE[J]. SIAM Journal on Computing, 2014, 43(2): 831-871. 10.1137/120868669
|
19 |
LYUBASHEVSKY V, PEIKERT C, REGEV O. On ideal lattices and learning with errors over rings[C]// Proceedings of the 2010 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 6110. Berlin: Springer, 2010: 1-23.
|
20 |
LIU X M, QIN B D, DENG R H, et al. An efficient privacy-preserving outsourced computation over public data[J]. IEEE Transactions on Services Computing, 2017, 10(5): 756-770. 10.1109/tsc.2015.2511008
|
21 |
XIONG J B, BI R W, ZHAO M F, et al. Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles[J]. IEEE Wireless Communications, 2020, 27(3): 24-30. 10.1109/mwc.001.1900463
|
22 |
NANDAKUMAR K, RATHA N, PANKANTI S, et al. Towards deep neural network training on encrypted data[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops. Piscataway: IEEE, 2019: 40-48. 10.1109/cvprw.2019.00011
|
23 |
HALEVI S, SHOUP V. Design and implementation of HElib: a homomorphic encryption library[EB/OL]. (2020-12-25) [2021-10-12].. 10.1007/s00145-020-09368-7
|