Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022
DOI: 10.1145/3548606.3560631
|View full text |Cite
|
Sign up to set email alerts
|

Star

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…Secure machine learning. Many approaches have been developed for machine learning without secure aggregation [10,14,16,26,31]. These approaches often ask clients to secret-share model updates between two servers, and run an MPC protocol between the two servers.…”
Section: Related Workmentioning
confidence: 99%
“…Secure machine learning. Many approaches have been developed for machine learning without secure aggregation [10,14,16,26,31]. These approaches often ask clients to secret-share model updates between two servers, and run an MPC protocol between the two servers.…”
Section: Related Workmentioning
confidence: 99%