Funder
National Natural Science Foundation of China
Subject
Law,Hardware and Architecture,Software,General Computer Science,Computer Science Applications
Reference36 articles.
1. Machine learning in IoT secuity: Current solutions and future challenges;Hussain;IEEE Commun. Surv. Tutor.,2020
2. Securely and efficiently outsourcing decision tree inference;Zheng;IEEE Trans. Dependable Secure Comput.,2022
3. Edge-based blockchain architecture for event-driven IoT using hierarchical identity based encryption;Dp;Inf. Process. Manage.,2021
4. Learning the truth privately and confidently: Encrypted confidence-aware truth discovery in mobile crowdsensing;Zheng;IEEE Trans. Inf. Forensics Secur.,2018
5. N. Agrawal, A.S. Shamsabadi, M.J. Kusner, A. Gascon, QUOTIENT: two-party secure neural network training and prediction, in: Proc. of ACM CCS, 2019.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献