A Hybrid Secure Two-Party Protocol for Vertical Federated Learning

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:UbiSec (2. : 2022 : Zhangjiajie) Ubiquitous security
1. Verfasser: Yang, Wenti (VerfasserIn)
Weitere Verfasser: He, Zhaoyang (VerfasserIn), Li, Yalei (VerfasserIn), Zhang, Haiyan (VerfasserIn), Guan, Zhitao (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2023
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Listen to the Music: Evaluating the Use of Music in Audio Based Authentication 2023 Tsai, Michael
System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection 2023 Carter, John
Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing 2023 Akter, Shapna
Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning 2023 Li, Xiangbin
Improved DeepLabV3+ based Railway Track Extraction to Enhance Railway Transportation Safety 2023 Weng, Yanbin
Threat Modeling in Cloud Computing - A Literature Review 2023 Kharma, Mohammed
An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis 2023 Feng, Guanghui
BlockLearning: A Modular Framework for Blockchain-Based Vertical Federated Learning 2023 Dias, Henrique
Empirical Likelihood for PLSIM with Missing Response Variables and Error-Prone Covariates 2023 Qi, Xin
CATS: A Serious Game in Industry Towards Stronger Cloud Security 2023 Zhao, Tiange
A Hybrid Secure Two-Party Protocol for Vertical Federated Learning 2023 Yang, Wenti
Vulnerability Detection with Representation Learning 2023 Wang, Zhiqiang
Malware Traffic Classification Based on GAN and BP Neural Networks 2023 Duan, Yun
Source Code Vulnerability Detection Using Deep Learning Algorithms for Industrial Applications 2023 Louati, Akram
Encryption Proxies in a Confidential Computing Environment 2023 Bouhairi, Mohamad Jamil Al
FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization 2023 Li, Yuting
Differentially Private Clustering Algorithm for Mixed Data 2023 Cheng, Kai
A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud 2023 Huo, Zhenru
Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network 2023 Khan, Saad
On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security 2023 Alshaikh, Omar
Alle Artikel auflisten