Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
NPMML: A framework for non-interactive privacy-preserving multi-party machine learning
In the recent decade, deep learning techniques have been widely adopted for founding
artificial Intelligent applications, which led to successes in many data analysis tasks, such as …
artificial Intelligent applications, which led to successes in many data analysis tasks, such as …
Cloud-based quadratic optimization with partially homomorphic encryption
This article develops a cloud-based protocol for a constrained quadratic optimization
problem involving multiple parties, each holding private data. The protocol is based on the …
problem involving multiple parties, each holding private data. The protocol is based on the …
Secure optimization computation outsourcing in cloud computing: A case study of linear programming
Cloud computing enables an economically promising paradigm of computation outsourcing.
However, how to protect customers confidential data processed and generated during the …
However, how to protect customers confidential data processed and generated during the …
Highly efficient linear regression outsourcing to a cloud
With cloud computing and mobile computing becoming more and more popular, there are a
lot potential applications for computation outsourcing to the cloud. This paper investigates …
lot potential applications for computation outsourcing to the cloud. This paper investigates …
Private optimization on networks
This paper considers a distributed multi-agent optimization problem, with the global
objective consisting of the sum of local objective functions of the agents. The agents solve …
objective consisting of the sum of local objective functions of the agents. The agents solve …
Practical privacy-preserving multiparty linear programming based on problem transformation
Cryptographic solutions to privacy-preserving multiparty linear programming are slow. This
makes them unsuitable for many economically important applications, such as supply chain …
makes them unsuitable for many economically important applications, such as supply chain …
A verifiable multiparty computation solver for the linear assignment problem: And applications to air traffic management
The assignment problem is an essential problem in many application fields and frequently
used to optimize resource usage. The problem is well understood and various efficient …
used to optimize resource usage. The problem is well understood and various efficient …
Minimization of randomized unit test cases
Y Lei, JH Andrews - 16th IEEE International Symposium on …, 2005 - ieeexplore.ieee.org
We describe a framework for randomized unit testing, and give empirical evidence that
generating unit test cases randomly and then minimizing the failing test cases results in …
generating unit test cases randomly and then minimizing the failing test cases results in …
An efficient and privacy‐preserving scheme for P2P energy exchange among smart microgrids
To date, increasing number of entities on the smart grid begin to establish their local energy
generator for ensuring reliability and resilience of power supply. These 'microgrids' can …
generator for ensuring reliability and resilience of power supply. These 'microgrids' can …
Design of large scale applications of secure multiparty computation: secure linear programming
SJA de Hoogh - 2012 - research.tue.nl
Secure multiparty computation is a basic concept of growing interest in modern
cryptography. It allows a set of mutually distrusting parties to perform a computation on their …
cryptography. It allows a set of mutually distrusting parties to perform a computation on their …