[1] |
Liu Junxu, Meng Xiaofeng.
Survey on Privacy-Preserving Machine Learning
[J]. Journal of Computer Research and Development, 2020, 57(2): 346-362.
|
[2] |
Lu Xiaofeng, Liao Yuying, Pietro Lio, Pan Hui.
An Asynchronous Federated Learning Mechanism for Edge Network Computing
[J]. Journal of Computer Research and Development, 2020, 57(12): 2571-2582.
|
[3] |
Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei.
Research Advances on Privacy Preserving in Edge Computing
[J]. Journal of Computer Research and Development, 2020, 57(10): 2027-2051.
|
[4] |
Qin Hong, Wang Hao, Wei Xiaochao, Zheng Zhihua.
Secure Constant-Round Multi-User k-Means Clustering Protocol
[J]. Journal of Computer Research and Development, 2020, 57(10): 2188-2200.
|
[5] |
Wei Xiaochao, Xu Lin, Zheng Zhihua, Wang Hao.
Efficient and Secure Cloud-Assisted Pattern Matching Protocol for Intelligent Environment
[J]. Journal of Computer Research and Development, 2019, 56(11): 2365-2374.
|
[6] |
Zhou Jun, Dong Xiaolei, Cao Zhenfu.
Research Advances on Privacy Preserving in Recommender Systems
[J]. Journal of Computer Research and Development, 2019, 56(10): 2033-2048.
|
[7] |
He Yingzhe, Hu Xingbo, He Jinwen, Meng Guozhu, Chen Kai.
Privacy and Security Issues in Machine Learning Systems: A Survey
[J]. Journal of Computer Research and Development, 2019, 56(10): 2049-2070.
|
[8] |
Song Lei, Ma Chunguang, Duan Guanghan, Yuan Qi.
Privacy-Preserving Logistic Regression on Vertically Partitioned Data
[J]. Journal of Computer Research and Development, 2019, 56(10): 2243-2249.
|
[9] |
Cao Zhenfu.
New Devolopment of Information Security——For the 60th Anniversary of Journal of Computer Research and Development
[J]. Journal of Computer Research and Development, 2019, 56(1): 131-137.
|
[10] |
Guo Yingjie, Liu Xiaoyan, Wu Chenxi, Guo Maozu,Li Ao.
U-Statistics and Ensemble Learning Based Method for Gene-Gene Interaction Detection
[J]. Journal of Computer Research and Development, 2018, 55(8): 1683-1693.
|
[11] |
Xiong Jinbo, Ma Rong, Niu Ben, Guo Yunchuan, Lin Li.
Privacy Protection Incentive Mechanism Based on User-Union Matching in Mobile Crowdsensing
[J]. Journal of Computer Research and Development, 2018, 55(7): 1359-1370.
|
[12] |
Li Shuai, Fu Anmin, Su Mang, Chen Zhenzhu, Sun Yinxia3.
Secure and Verifiable Protocol for Outsourcing Group Power Exponent to a Single Server
[J]. Journal of Computer Research and Development, 2018, 55(11): 2482-2489.
|
[13] |
Wei Xiaochao, Zheng Zhihua, Wang Hao.
An Efficient and Secure Three-Party Wildcard Pattern Matching Protocol
[J]. Journal of Computer Research and Development, 2018, 55(10): 2125-2133.
|
[14] |
Chen Zhenhua, Li Shundong, Wang Daoshun, Huang Qiong, Dong Lihong.
Protocols for Secure Computation of Set-Inclusion with the Unencrypted Method
[J]. Journal of Computer Research and Development, 2017, 54(7): 1549-1556.
|
[15] |
Shen Liyan, Chen Xiaojun, Shi Jinqiao, Hu Lanlan.
Survey on Private Preserving Set Intersection Technology
[J]. Journal of Computer Research and Development, 2017, 54(10): 2153-2169.
|