[1] |
刘睿瑄,陈红,郭若杨,等.机器学习中的隐私攻击与防御[J].软件学报,2020,31(3):866-892.
|
|
Liu Rui-Xuan,Chen Hong,Guo Ruo-yang,et al.Survey on privacy attacks and defenses in machine learning [J].Journal of Software,2020,31(3):866-892.
|
[2] |
李顺东,王道顺.基于同态加密的高效多方保密计算[J].电子学报,2013,41(4):798-803.
|
|
Li Shun-dong,Wang Dao-shun,Efficient secure multiparty computation based on homomorphic encryption [J].Acta Electronica Sinica,2013,41(4):798-803.
|
[3] |
沈志荣,薛巍,舒继武.可搜索加密机制研究与进展[J].软件学报,2014,25(4):880-895.
|
|
Shen Zhi-rong,Xue Wei,Shu Ji-wu.Survey on the research and development of searchable encryption schemes [J].Journal of Software,2014,25(4):880-895.
|
[4] |
杨旸,杨书略,柯闽.加密云数据下基于Simhash的模糊排序搜索方案[J].计算机学报,2017,40(2):431-444.
|
|
Yang Yang,Yang Shu-lue,Ke Min.Ranked fuzzy keyword search based on Simhash over encrypted cloud data [J].Chinese Journal of Computers,2017,40(2):431-444.
|
[5] |
Dwork C.Differential privacy[C]∥Proc of the 33rd International Conference on Automata,Languages and Programming,2006:1-12.
|
[6] |
Dwork C,Agrawal M,Du D,et al.Differential privacy:A survey of results[C]∥Proc of International Conference on Theory and Applications of Models of Computation,2008:1-19.
|
[7] |
Dwork C,Lei J.Differential privacy and robust statistics[C]∥Proc of the 41st Annual ACM Symposium on Theory of Computing,2009:371-380.
|
[8] |
Dwork C,Mcsherry F,Nissim K,et al.Calibrating noise to sensitivity in private data analysis[C]∥Proc of the 3rd Conference on Theory of Cryptography,2006:265-284.
|
[9] |
Mcsherry F,Talwark K.Mechanism design via differential privacy[C]∥Proc of the 48th Annual IEEE Symposium on Foundations of Computer Science,2007:94-103.
|
[10] |
Dwork C,Roth A. The algorithmic foundations of differential privacy[J].Foundations and Trends in Theoretical Computer Science,2014,9(3/4):211-407.
|
[11] |
Patil A,Singh S.Differential private random forest [C]∥Proc of the 2014 International Conference on Advances in Computing,Communications and Informatics,2014:2623-2630.
|
[12] |
Fletcher S,Islam M Z.A differentially private decision forest [J].Expert Systems with Applications,2017,78:16-31.
|
[13] |
穆海蓉,丁丽萍,宋宇宁,等.DiffPRFs:一种面向随机森林的差分隐私保护算法[J].通信学报,2016,37(9):175-182.
|
|
Mu Hai-rong,Ding Li-ping,Song Yu-ning,et al.DiffPRFs:Random forest under differential privacy[J].Journal on Communications,2016,37(9):175-182.
|
[14] |
Guan Z T,Sun X W,Shi L Y,et al.A differentially private greedy decision forest classification algorithm with high utility[J].Computers & Security,2020,96:101930.
|
[15] |
LI Y,Bai C X,Reddy C K.A distributed ensemble approach for mining healthcare data under privacy constraints[J].Information Sciences,2016,330:245-259.
|
[16] |
沈思倩.关于差分隐私保护分类算法的研究[D].南京:南京航空航天大学,2017.
|
|
Shen Si-qian.Research on the differential privacy classification algorithms[D].Nanjing:Nanjing University of Aeronautics and Astronautics,2017.
|
[17] |
贾俊杰,邱万勇,马慧芳.差分隐私保护约束下集成分类算法的研究[J].信息安全学报,2021,6(4):106-118.
|
|
Jia Jun-jie,Qiu Wan-yong,Ma Hui-fang.Research on an ensemble classification algorithm under differential privacy[J].Journal of Cyber Security,2021,6(4):106-118.
|
[18] |
Li Q B,Wu Z M,Wen Z Y,et al.Privacy-preserving gradient boosting decision trees[J].Proceedings of the AAAI Conference on Artificial Intelligence,2020,34(1):784-791.
|
[19] |
朱祥.联邦学习下差分隐私保护技术研究与实现[D].南京:南京邮电大学,2021.
|
|
Zhu Xiang.Research and implementation of differential privacy protection technology under federated learning[D].Nanjing:Nanjing University of Posts and Telecommunications,2021.
|
[20] |
谢世茂,毛航,陈思成.基于纵向联邦学习的快速提升树算法[J].信息技术与标准化,2022,450(6):55-61.
|
|
Xie Shi-mao,Mao Hang,Chen Si-cheng.Fastboosting tree algorithm based on heterogeneous federated learning[J].Information Technology & Standardization,2022,450(6):55-61.
|
[21] |
宛艳萍,谷佳真,张芳.融合改进Stacking与规则的文本情感分析[J].小型微型计算机系统,2021,42(7):1389-1395.
|
|
Wan Yan-ping,Gu Jia-zhen,Zhang Fang.Text emotion analysis based on the integration of improved Stacking and rules[J].Journal of Chinese Computer Systems,2021,42(7):1389-1395.
|
[22] |
余东行,张保明,赵传,等.联合卷积神经网络与集成学习的遥感影像场景分类[J].遥感学报,2020,24(6):717-727.
|
|
Yu Dong-xing,Zhang Bao-ming,Zhao Chuan,et al.Scene classification of remote sensing image using ensemble con- volutional neural network[J]. National Remote Sensing Bulletin,2020,24(6):717-727.
|
[23] |
代伟,许峻玮,王鹤杰,等.SPNG+:基于stacking集成策略预测革兰氏阳性菌非经典分泌蛋白质[J].中国生物化学与分子生物学报,2021,37(7):937-947.
|
|
Dai Wei,Xu Jun-wei,Wang He-jie,et al.SPNG+:A stacking ensemble method to predict non-classical secreted proteins in gram-positive bacteria[J]. Chinese Journal of Biochemistry and Molecular Biology, 2021,37(7):937-947.
|
[24] |
Salem A,Zhang Y,Humbert M,et al.ML-Leaks:Model and data independent membership inference attacks and defenses on machine learning models[C]∥Proc of the 2019 Network and Distributed System Security Symposium,2019:24-27.
|
[25] |
Yao Q,Guo X,Kwork J,et al.Privacy-preserving stacking with application to cross-organizational diabetes prediction[C]∥Proc of the 28th International Joint Conference on Artificial Intelligence,2019:4114-4120.
|
[26] |
李帅,常锦才,李吕牧之,等.基于差分隐私保护的Stacking集成聚类算法研究[J].计算机工程与科学,2022,44(8):1402-1408.
|
|
Li Shuai,Chang Jin-cai,Li-Lü Mu-zhi,et al.A Stacking ensemble clustering algorithm based on differential privacy protection[J]. Computer Engineering & Science,2022,44(8):1402-1408.
|
[27] |
Rodgers J L,Nicewander W A.Thirteen ways to look at the correlation coefficient[J].The American Statistician,1988,42(1):59-66.
|
[28] |
董永权,王占民.关于相关系数ρ的几点注释[J].大学数学,2008,24(2):182-186.
|
|
Dong Yong-quan,Wang Zhan-min.Some notes about correlation coefficient ρ[J].College Mathematics,2008,24(2):182-186.
|