2021
DOI: 10.1016/j.ins.2020.09.064
|View full text |Cite
|
Sign up to set email alerts
|

PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
70
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 73 publications
(70 citation statements)
references
References 12 publications
0
70
0
Order By: Relevance
“…With the development of deep learning techniques, [45][46][47] some deep nervous models and reinforcement learning models have been proposed. Hu et al 48 proposed a three-way neural interaction model with a common attention mechanism through utilizes rich meta-path-based contexts, which was able to learn representations of users, items, and meta-path contexts for recommendations.…”
Section: Recommendation With Knowledge Graphsmentioning
confidence: 99%
“…With the development of deep learning techniques, [45][46][47] some deep nervous models and reinforcement learning models have been proposed. Hu et al 48 proposed a three-way neural interaction model with a common attention mechanism through utilizes rich meta-path-based contexts, which was able to learn representations of users, items, and meta-path contexts for recommendations.…”
Section: Recommendation With Knowledge Graphsmentioning
confidence: 99%
“…Liu et al, 38 Ge et al, 39 and Zhang et al 40 proposed the verifiable dynamic SE scheme leveraging the RSA accumulator based on public-key, Accumulative Authentication Tag based on the symmetric-key and Vector Commitment Tree, respectively. Moreover, to further enrich query functionality, some secure data storage, 41 secure data deduplication, 42 secure data aggregation [43][44][45][46][47] and secure video retrieval 48 schemes also be designed.…”
Section: Security Analysis For the Fpmrse Schemementioning
confidence: 99%
“…In recent years, wireless communication has been put into many efforts from the researchers of both academy and industry [1,2], which inspires a lot of practical applications, such as internet of things and video monitoring [3]. Among these applications, a key feature is that massive calculating is involved due to the massive number of accessing nodes [4]. To suppress the massive calculating, cloud computing has been proposed which assisted the task calculating through wireless transmission [5,6].…”
Section: Introductionmentioning
confidence: 99%