Empirical risk minimization in the non-interactive local model of differential privacy

被引:0
|
作者
Wang, Di [1 ]
Gaboardi, Marco [2 ]
Smith, Adam [2 ]
Xu, Jinhui [1 ]
机构
[1] Department of Computer Science and Engineering, University at Buffalo, SUNY, Buffalo,NY,14260, United States
[2] Department of Computer Science, Boston University, Boston,MA,02215, United States
关键词
50;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials
    Derler, David
    Hanser, Christian
    Slamanig, Daniel
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 49 - 65
  • [32] Non-interactive Timestamping in the Bounded-Storage Model
    Tal Moran
    Ronen Shaltiel
    Amnon Ta-Shma
    Journal of Cryptology, 2009, 22 : 189 - 226
  • [33] A non-interactive privacy preserved training technique based on hybrid deep learning
    Raveendran, Anju
    Dhanapal, R.
    OPTIK, 2023, 273
  • [34] Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications
    Tang, Xiaoting
    Wang, Cong
    Yuan, Xingliang
    Wang, Qian
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1997 - 2005
  • [35] Group Encryption: Non-interactive Realization in the Standard Model
    Cathalo, Julien
    Libert, Benoit
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 179 - +
  • [36] Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
    Brunetta, Carlo
    Tsaloli, Georgia
    Liang, Bei
    Banegas, Gustavo
    Mitrokotsa, Aikaterini
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 510 - 528
  • [37] Non-interactive Privacy Preserving Recurrent Neural Network Prediction with Homomorphic Encryption
    Podschwadt, Robert
    Takabi, Daniel
    2021 IEEE 14TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2021), 2021, : 65 - 70
  • [38] Non-interactive Timestamping in the Bounded-Storage Model
    Moran, Tal
    Shaltiel, Ronen
    Ta-Shma, Amnon
    JOURNAL OF CRYPTOLOGY, 2009, 22 (02) : 189 - 226
  • [39] A secure non-interactive chaotic maps-based deniable authentication scheme with privacy protection in standard model
    Zhu H.
    Zhang Y.
    Journal of Computers (Taiwan), 2018, 29 (03) : 109 - 120
  • [40] Non-interactive and privacy-preserving neural network learning using functional encryption
    Deng, Guoqiang
    Duan, Xuefeng
    Tang, Min
    Zhang, Yuhao
    Huang, Ying
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 145 : 454 - 465