[1] |
Liu Junxu, Meng Xiaofeng.
Survey on Privacy-Preserving Machine Learning
[J]. Journal of Computer Research and Development, 2020, 57(2): 346-362.
|
[2] |
Lu Xiaofeng, Liao Yuying, Pietro Lio, Pan Hui.
An Asynchronous Federated Learning Mechanism for Edge Network Computing
[J]. Journal of Computer Research and Development, 2020, 57(12): 2571-2582.
|
[3] |
Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei.
Research Advances on Privacy Preserving in Edge Computing
[J]. Journal of Computer Research and Development, 2020, 57(10): 2027-2051.
|
[4] |
Qin Hong, Wang Hao, Wei Xiaochao, Zheng Zhihua.
Secure Constant-Round Multi-User k-Means Clustering Protocol
[J]. Journal of Computer Research and Development, 2020, 57(10): 2188-2200.
|
[5] |
Song Xiangfu, Gai Min, Zhao Shengnan, Jiang Han.
Privacy-Preserving Statistics Protocol for Set-Based Computation
[J]. Journal of Computer Research and Development, 2020, 57(10): 2221-2231.
|
[6] |
Zhou Jun, Dong Xiaolei, Cao Zhenfu.
Research Advances on Privacy Preserving in Recommender Systems
[J]. Journal of Computer Research and Development, 2019, 56(10): 2033-2048.
|
[7] |
Song Lei, Ma Chunguang, Duan Guanghan, Yuan Qi.
Privacy-Preserving Logistic Regression on Vertically Partitioned Data
[J]. Journal of Computer Research and Development, 2019, 56(10): 2243-2249.
|
[8] |
Cao Zhenfu.
New Devolopment of Information Security——For the 60th Anniversary of Journal of Computer Research and Development
[J]. Journal of Computer Research and Development, 2019, 56(1): 131-137.
|
[9] |
Li Shuai, Fu Anmin, Su Mang, Chen Zhenzhu, Sun Yinxia3.
Secure and Verifiable Protocol for Outsourcing Group Power Exponent to a Single Server
[J]. Journal of Computer Research and Development, 2018, 55(11): 2482-2489.
|
[10] |
Zhu Liehuang, Gao Feng, Shen Meng, Li Yandong, Zheng Baokun, Mao Hongliang, Wu Zhen.
Survey on Privacy Preserving Techniques for Blockchain Technology
[J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186.
|
[11] |
Zhou Changli, Ma Chunguang, Yang Songtao.
Location Privacy-Preserving Method for LBS Continuous KNN Query in Road Networks
[J]. Journal of Computer Research and Development, 2015, 52(11): 2628-2644.
|
[12] |
Tan Qingfeng1,2,4, Fang Binxing1,2,3, Shi Jinqiao1,2, Xu Fanwen3, Chen Xiaojun1,2,4.
StegoP2P: A Hidden Communication Approach in P2P Networks
[J]. 计算机研究与发展, 2014, 51(8): 1695-1703.
|
[13] |
Dai Hua,Yang Geng, Qin Xiaolin, and Liu Liang.
Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks
[J]. 计算机研究与发展, 2013, 50(6): 1239-1252.
|
[14] |
Fang Weiwei, Ren Jiang, and Xia Hongke.
Heterogeneous Distributed Linear Regression Privacy-Preserving Modeling
[J]. , 2011, 48(9): 1685-1692.
|
[15] |
Zhang Zhancheng, Wang Shitong, and Fu-Lai Chung.
Collaborative Classification Mechanism for Privacy-Preserving
[J]. , 2011, 48(6): 1018-1028.
|