| 1 | 耿艺宁,刘帅师,刘泰廷,等. 基于计算机视觉的行人检测技术综述[J]. 计算机应用, 2021, 41(S1): 43-50. | 
																													
																							|  | GENG Y N, LIU S S, LIU T Y, et al. Survey of pedestrian detection technology based on computer vision[J]. Journal of Computer Applications, 2021, 41(S1): 43-50. | 
																													
																							| 2 | LUO X Y, LI L, WAN H, et al. Phone Keypad Voice Recognition (PKVR): an integrated experiment for digital signal processing education[C]// Proceedings of the 2020 IEEE Frontiers in Education Conference. Piscataway: IEEE, 2020: 1-4.  10.1109/fie44824.2020.9273815 | 
																													
																							| 3 | GUO Y Y, BI L, AHN E, et al. A spatiotemporal volumetric interpolation network for 4D dynamic medical image[C]// Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2020: 4725-4734.  10.1109/cvpr42600.2020.00478 | 
																													
																							| 4 | 徐占洋,郑克长. 云计算下基于改进遗传算法的聚类融合算法[J]. 计算机应用, 2018, 38(2): 458-463.  10.11772/j.issn.1001-9081.2017071749 | 
																													
																							|  | XU Z Y, ZHEN K C. Clustering ensemble algorithm based on improved genetic algorithm in cloud computing[J]. Journal of Computer Applications, 2018, 38(2): 458-463.  10.11772/j.issn.1001-9081.2017071749 | 
																													
																							| 5 | 熊金波,毕仁万,陈前昕,等. 边缘协作的轻量级安全区域建议网络[J]. 通信学报, 2020, 41(10): 188-201. | 
																													
																							|  | XIONG J B, BI R W, CHEN Q X, et al. Towards edge-collaborative, lightweight and secure region proposal network[J]. Journal on Communications, 2020, 41(10): 188-201. | 
																													
																							| 6 | WONG J C. The Cambridge Analytica scandal changed the world — but it didn’t change Facebook[N/OL]. GuardianThe. (2019-03-18) [2021-10-12].. | 
																													
																							| 7 | HARWELL D. Thousands of zoom video calls left exposed on open web[N/OL]. The Washington Post. (2020-04-03) [2021-10-12].. | 
																													
																							| 8 | 毕仁万,陈前昕,熊金波,等. 面向深度神经网络的安全计算协议设计方法[J]. 网络与信息安全学报, 2020, 6(4): 130-139.  10.11959/j.issn.2096-109x.2020050 | 
																													
																							|  | BI R W, CHEN Q X, XIONG J B, et al. Design method of secure computing protocol for deep neural network[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 130-139.  10.11959/j.issn.2096-109x.2020050 | 
																													
																							| 9 | XIE P T, BILENKO M, FINLEY T, et al. Crypto-nets: neural networks over encrypted data[EB/OL]. (2020-04-03) [2021-10-12].. | 
																													
																							| 10 | GILAD-BACHRACH R, DOWLIN N, LAINE K, et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy[C]// Proceedings of the 33rd International Conference on Machine Learning. New York: JMLR.org, 2016: 201-210. | 
																													
																							| 11 | CHABANNE H, DE WARGNY A, MILGRAM J, et al. Privacy-preserving classification on deep neural network[EB/OL]. (2017-03-24) [2021-10-12].. | 
																													
																							| 12 | BADAWI A AL, JIN C, LIN J, et al. Towards the AlexNet moment for homomorphic encryption: HCNN, the first homomorphic CNN on encrypted data with GPUs[J]. IEEE Transactions on Emerging Topics in Computing, 2021, 9(3): 1330-1343.  10.1109/tetc.2020.3014636 | 
																													
																							| 13 | XIONG J B, BI R W, TIAN Y L, et al. Toward lightweight, privacy-preserving cooperative object classification for connected autonomous vehicles[J]. IEEE Internet of Things Journal, 2022, 9(4): 2787-2801.  10.1109/jiot.2021.3093573 | 
																													
																							| 14 | ZHANG Q C, YANG L T, CHEN Z K. Privacy preserving deep computation model on cloud for big data feature learning[J]. IEEE Transactions on Computers, 2016, 65(5): 1351-1362.  10.1109/tc.2015.2470255 | 
																													
																							| 15 | HESAMIFARD E, TAKABI H, GHASEMI M, et al. Privacy-preserving machine learning in cloud[C]// Proceedings of the 2017 Cloud Computing Security Workshop. New York: ACM, 2017: 39-43.  10.1145/3140649.3140655 | 
																													
																							| 16 | BOURSE F, MINELLI M, MINIHOLD M, et al. Fast homomorphic evaluation of deep discretized neural networks[C]// Proceedings of the 2018 Annual International Cryptology Conference, LNCS 10993. Cham: Springer, 2018: 483-512. | 
																													
																							| 17 | LOU Q, FENG B, FOX G C, et al. Glyph: fast and accurately training deep neural networks on encrypted data[C/OL]// Proceedings of the 34th Conference on Neural Information Processing Systems. [2021-09-20]..  10.1109/iconip.2002.1198214 | 
																													
																							| 18 | BRAKERSKI Z, VAIKUNTANATHAN V. Efficient fully homomorphic encryption from (standard) LWE[J]. SIAM Journal on Computing, 2014, 43(2): 831-871.  10.1137/120868669 | 
																													
																							| 19 | LYUBASHEVSKY V, PEIKERT C, REGEV O. On ideal lattices and learning with errors over rings[C]// Proceedings of the 2010 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 6110. Berlin: Springer, 2010: 1-23. | 
																													
																							| 20 | LIU X M, QIN B D, DENG R H, et al. An efficient privacy-preserving outsourced computation over public data[J]. IEEE Transactions on Services Computing, 2017, 10(5): 756-770.  10.1109/tsc.2015.2511008 | 
																													
																							| 21 | XIONG J B, BI R W, ZHAO M F, et al. Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles[J]. IEEE Wireless Communications, 2020, 27(3): 24-30.  10.1109/mwc.001.1900463 | 
																													
																							| 22 | NANDAKUMAR K, RATHA N, PANKANTI S, et al. Towards deep neural network training on encrypted data[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops. Piscataway: IEEE, 2019: 40-48.  10.1109/cvprw.2019.00011 | 
																													
																							| 23 | HALEVI S, SHOUP V. Design and implementation of HElib: a homomorphic encryption library[EB/OL]. (2020-12-25) [2021-10-12]..  10.1007/s00145-020-09368-7 |