Login / Signup

Secure Computation to Hide Functions of Inputs.

Gowtham R. KurriVinod M. Prabhakaran
Published in: ISIT (2020)
Keyphrases
  • efficient computation
  • similarity measure
  • data sets
  • neural network
  • machine learning
  • information retrieval
  • learning algorithm
  • feature space
  • basis functions
  • digital signature
  • security measures