Login / Signup
Secure Computation to Hide Functions of Inputs.
Gowtham R. Kurri
Vinod M. Prabhakaran
Published in:
CoRR (2020)
Keyphrases
</>
security issues
security mechanisms
databases
neural network
efficient computation
data sets
artificial intelligence
website
decision trees
multiscale
basis functions
parallel computation
identity management