-
1
Privacy-preserving trajectory similarity computation method
Published 2022-11-01Subjects: Get full text
Article -
2
Light weighted privacy protection ViT inference framework based on secret sharing
Published 2024-04-01Subjects: Get full text
Article -
3
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01Subjects: “…data collaborative secure computing…”
Get full text
Article -
4
Towards edge-collaborative,lightweight and secure region proposal network
Published 2020-10-01Subjects: Get full text
Article -
5
Design method of secure computing protocol for deep neural network
Published 2020-08-01Subjects: Get full text
Article -
6
Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing
Published 2025-01-01Subjects: Get full text
Article -
7
Secure Biometric Verification in the Presence of Malicious Adversaries
Published 2025-01-01Subjects: Get full text
Article -
8
Attribute generalization mix-zone based on multiple secure computation
Published 2019-04-01Subjects: Get full text
Article -
9
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01Subjects: Get full text
Article