Construct a Secure CNN Against Gradient Inversion Attack.
Yu-Hsin LiuYu-Chun ShenHsi-Wen ChenMing-Syan ChenPublished in: PAKDD (3) (2024)
Keyphrases
- key exchange protocol
- cellular neural networks
- security measures
- authentication mechanism
- authentication protocol
- key management
- block cipher
- countermeasures
- security issues
- key agreement
- information leakage
- lightweight
- user authentication
- standard model
- remote user authentication scheme
- security management
- security protocols
- security analysis
- encryption scheme
- secret key
- personal information