Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Combined federated and split learning in edge computing for ubiquitous intelligence in internet of things: State-of-the-art and future directions
Federated learning (FL) and split learning (SL) are two emerging collaborative learning
methods that may greatly facilitate ubiquitous intelligence in the Internet of Things (IoT) …
methods that may greatly facilitate ubiquitous intelligence in the Internet of Things (IoT) …
Trusted ai in multiagent systems: An overview of privacy and security for distributed learning
Motivated by the advancing computational capacity of distributed end-user equipment (UE),
as well as the increasing concerns about sharing private data, there has been considerable …
as well as the increasing concerns about sharing private data, there has been considerable …
{ABY2. 0}: Improved {Mixed-Protocol} secure {Two-Party} computation
Secure Multi-party Computation (MPC) allows a set of mutually distrusting parties to jointly
evaluate a function on their private inputs while maintaining input privacy. In this work, we …
evaluate a function on their private inputs while maintaining input privacy. In this work, we …
A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
Fast private set intersection from homomorphic encryption
Private Set Intersection (PSI) is a cryptographic technique that allows two parties to compute
the intersection of their sets without revealing anything except the intersection. We use fully …
the intersection of their sets without revealing anything except the intersection. We use fully …
[PDF][PDF] ABY-A framework for efficient mixed-protocol secure two-party computation.
Secure computation enables mutually distrusting parties to jointly evaluate a function on
their private inputs without revealing anything but the function's output. Generic secure …
their private inputs without revealing anything but the function's output. Generic secure …
PSI from PaXoS: Fast, malicious private set intersection
We present a 2-party private set intersection (PSI) protocol which provides security against
malicious participants, yet is almost as fast as the fastest known semi-honest PSI protocol of …
malicious participants, yet is almost as fast as the fastest known semi-honest PSI protocol of …
SpOT-light: lightweight private set intersection from sparse OT extension
We describe a novel approach for two-party private set intersection (PSI) with semi-honest
security. Compared to existing PSI protocols, ours has a more favorable balance between …
security. Compared to existing PSI protocols, ours has a more favorable balance between …
Efficient two-round OT extension and silent non-interactive secure computation
We consider the problem of securely generating useful instances of two-party correlations,
such as many independent copies of a random oblivious transfer (OT) correlation, using a …
such as many independent copies of a random oblivious transfer (OT) correlation, using a …
Private set intersection in the internet setting from lightweight oblivious PRF
We present a new protocol for two-party private set intersection (PSI) with semi-honest
security in the plain model and one-sided malicious security in the random oracle model …
security in the plain model and one-sided malicious security in the random oracle model …