[1] |
Liu Junxu, Meng Xiaofeng.
Survey on Privacy-Preserving Machine Learning
[J]. Journal of Computer Research and Development, 2020, 57(2): 346-362.
|
[2] |
Lu Xiaofeng, Liao Yuying, Pietro Lio, Pan Hui.
An Asynchronous Federated Learning Mechanism for Edge Network Computing
[J]. Journal of Computer Research and Development, 2020, 57(12): 2571-2582.
|
[3] |
Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei.
Research Advances on Privacy Preserving in Edge Computing
[J]. Journal of Computer Research and Development, 2020, 57(10): 2027-2051.
|
[4] |
Qin Hong, Wang Hao, Wei Xiaochao, Zheng Zhihua.
Secure Constant-Round Multi-User k-Means Clustering Protocol
[J]. Journal of Computer Research and Development, 2020, 57(10): 2188-2200.
|
[5] |
Song Xiangfu, Gai Min, Zhao Shengnan, Jiang Han.
Privacy-Preserving Statistics Protocol for Set-Based Computation
[J]. Journal of Computer Research and Development, 2020, 57(10): 2221-2231.
|
[6] |
Zhou Jun, Dong Xiaolei, Cao Zhenfu.
Research Advances on Privacy Preserving in Recommender Systems
[J]. Journal of Computer Research and Development, 2019, 56(10): 2033-2048.
|
[7] |
He Yingzhe, Hu Xingbo, He Jinwen, Meng Guozhu, Chen Kai.
Privacy and Security Issues in Machine Learning Systems: A Survey
[J]. Journal of Computer Research and Development, 2019, 56(10): 2049-2070.
|
[8] |
Song Lei, Ma Chunguang, Duan Guanghan, Yuan Qi.
Privacy-Preserving Logistic Regression on Vertically Partitioned Data
[J]. Journal of Computer Research and Development, 2019, 56(10): 2243-2249.
|
[9] |
Cao Zhenfu.
New Devolopment of Information Security——For the 60th Anniversary of Journal of Computer Research and Development
[J]. Journal of Computer Research and Development, 2019, 56(1): 131-137.
|
[10] |
Liu Zhengyi, Song Tian.
Covert Sequence Channel Based on HTTP/2 Protocol
[J]. Journal of Computer Research and Development, 2018, 55(6): 1157-1166.
|
[11] |
Li Shuai, Fu Anmin, Su Mang, Chen Zhenzhu, Sun Yinxia3.
Secure and Verifiable Protocol for Outsourcing Group Power Exponent to a Single Server
[J]. Journal of Computer Research and Development, 2018, 55(11): 2482-2489.
|
[12] |
Zhu Liehuang, Gao Feng, Shen Meng, Li Yandong, Zheng Baokun, Mao Hongliang, Wu Zhen.
Survey on Privacy Preserving Techniques for Blockchain Technology
[J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186.
|
[13] |
Wang Haizhou, Chen Xingshu, Du Min, Wang Wenxian.
A Modeling Framework with Population Dynamics for Content Pollution Proliferation in P2P IPTV System
[J]. Journal of Computer Research and Development, 2016, 53(6): 1314-1324.
|
[14] |
Zhou Changli, Ma Chunguang, Yang Songtao.
Location Privacy-Preserving Method for LBS Continuous KNN Query in Road Networks
[J]. Journal of Computer Research and Development, 2015, 52(11): 2628-2644.
|
[15] |
Dai Hua,Yang Geng, Qin Xiaolin, and Liu Liang.
Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks
[J]. 计算机研究与发展, 2013, 50(6): 1239-1252.
|