Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 575-580.doi: 10.11896/jsjkx.211100155
• Information Security • Previous Articles Next Articles
WANG Jian
CLC Number:
[1] WANG J,WANG L.A new anonymity-based protocol preserving privacy based cloud environment[J].Computer Modelling and New Technologies,2014,18(9):139-144. [2] WILAMOWSKI B M.Neural network architectures and learning algorithms[J].Industrial Electronics Magazine,2009,3(4):56-63. [3] FRYE R C,RIETMAN E A,WONG C C.Back-propagationlearning and nonidealities in analog neural network hardware[J].IEEE Trans on Neural Networks,1991,2(1):110-117. [4] BARNI M,ORLANDI C,PIVA A.A privacy-preserving protocol for neural-network-based computation[C]//Proceedings of ACM MM&Sec'06.Geneva,Switzerland:ACM,2006:146-151. [5] WAN L,NG W K,HAN S,et al.Privacy-preservation for gradient descent methods[C]//Proceedings of ACM SIGKDD' 07.New York:ACM,2007:775-783. [6] SECRETAN J,GEORGIOPOULOS M,CASTRO J.A privacy preserving probabilistic neural network for horizontally partitioned databases[C]//Proceedings of IEEE IJCNN'07.Orlando,FL:IEEE,2007:1554-1559. [7] CRAVEN M P,CURTIS K M,HAYES-GILL B R.Frequency division multiplexing in analogue neural network[J].Electro-nics Letters,1991,27(11):918-920. [8] HUANG L,FENG D G,LIAN Y F,et al.Artificial-neural-network-based DDoS defense effectiveness evaluation[J].Journal of Computer Research and Development,2013,50(10):2100-2108. [9] KODA M.Neural network learning based on stochastic sensitivity analysis[J].IEEE Trans on Cybernetics,1997,27(1):132-135. [10] LI D L,LU D T,KONG X Y,et al.Implicit surfaces based on BP neural networks[J].Journal of Computer Research and Development,2007,44(3):467-472. [11] ABHISHEK K,KUMAR A,RANJAN R,et al.A rainfall prediction model using artificial neural network[C]//Proceedings of IEEE ICSGRC'12.Shah Alam,Selangor:IEEE,2012:82-87. [12] PASCAL P.Public-key cryptosystems based on composite degree residuosity classes[J].Lecture Notes in Computer Scien-ce,1999,1592(1):223-238. [13] DHAKAR R S,GUPTA A K,SHARMA P.Modified RSA encryption algorithm[C]//Proceedings of IEEE ACCT'12.Rohtak,Haryana:IEEE,2012:426-429. [14] ORLANDI C,PIVA A,BARNI M.Oblivious neural networkcomputing via homomorphic encryption[J].Journal of Information Security,2007,20(7):105-110. [15] SAMET S,MIRI A.Privacy preserving ID3 using gini index over horizontally partitioned data[C]//Proceedings of IEEE AICCSA'08.Doha:IEEE,2008:645-651. [16] CANETTI R.Security and composition of multiparty crypto-graphic protocols[J].Journal of Cryptology,2000,13(l):143-202. [17] RANE S,SUN W,VETRO A.Secure function evaluation based on secret sharing and homomorphic encryption[C]//Procee-dings of IEEE CCAC'09.Monticello,IL:IEEE,2009:827-834. [18] LINDA O,VOLLMER T,MANIC M.Neural network based intrusion detection system for critical infrastructures[C]//Proceedings of IEEE IJCNN'09.Atlanta,GA:IEEE,2009:1827-1834. [19] RAFIQ M A,ROY N K,GHOSH B C.Three algorithms for learning artificial neural network:A comparison for induction motor flux estimation[C]//Proceedings of IEEE ICCIT '09.Dhaka:IEEE,2009:355-360. [20] ADHIKARI S P,HYONGSUK K,BUDHATHOKI R K.A circuit-based learning architecture for multilayer neural networks with memristor bridge synapses[J].IEEE Transaction on Circuits and Systems,2015,62(1):215-223. [21] SHEIKH S.Arabic-urdu script recognition through mouse:An implementation using artificial neural network[C]//Proceedings of IEEE ITNG'10.Las Vegas,NV:IEEE,2010:307-310. [22] STEPHEN I,GALLANT.Neural network learning and expert systems [M].Massachusetts:MIT Press,1993. [23] ZHAN J,MATWIN S.A crypto-based approach to privacy-preserving collaborative data mining[C]//Proceedings of IEEE ICDM'06.Hong Kong:IEEE,2006:546-550. |
[1] | ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63. |
[2] | ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161. |
[3] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[4] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[5] | WANG Run-an, ZOU Zhao-nian. Query Performance Prediction Based on Physical Operation-level Models [J]. Computer Science, 2022, 49(8): 49-55. |
[6] | CHEN Yong-quan, JIANG Ying. Analysis Method of APP User Behavior Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(8): 78-85. |
[7] | ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119. |
[8] | YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236. |
[9] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[10] | QI Xiu-xiu, WANG Jia-hao, LI Wen-xiong, ZHOU Fan. Fusion Algorithm for Matrix Completion Prediction Based on Probabilistic Meta-learning [J]. Computer Science, 2022, 49(7): 18-24. |
[11] | YANG Bing-xin, GUO Yan-rong, HAO Shi-jie, Hong Ri-chang. Application of Graph Neural Network Based on Data Augmentation and Model Ensemble in Depression Recognition [J]. Computer Science, 2022, 49(7): 57-63. |
[12] | ZHANG Ying-tao, ZHANG Jie, ZHANG Rui, ZHANG Wen-qiang. Photorealistic Style Transfer Guided by Global Information [J]. Computer Science, 2022, 49(7): 100-105. |
[13] | DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119. |
[14] | LIU Yue-hong, NIU Shao-hua, SHEN Xian-hao. Virtual Reality Video Intraframe Prediction Coding Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(7): 127-131. |
[15] | XU Ming-ke, ZHANG Fan. Head Fusion:A Method to Improve Accuracy and Robustness of Speech Emotion Recognition [J]. Computer Science, 2022, 49(7): 132-141. |
|