[1] |
贾晓丰, 高嵩, 江茜, 等. 面向城市复杂系统的社会计算关键技术研究[J]. 智能科学与技术学报, 2021, 3(2):228-233.
doi: 10.11959/j.issn.2096-6652.202124
|
[2] |
STUREBORG R, DHINGRA B, YANG J. Interface Design for Crowdsourcing Hierarchical Multi-Label Text Annotations[C]. Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023: 1-17.
|
[3] |
YANG J, FAN J, WEI Z, et al. A game-based framework for crowdsourced data labeling[J]. The VLDB Journal, 2020, 29: 1311-1336.
doi: 10.1007/s00778-020-00613-w
|
[4] |
TU J, HAN X, FAN J, et al. Dader: hands-off entity resolution with domain adaptation[J]. Proceedings of the VLDB Endowment, 2022, 15: 3666-3669.
doi: 10.14778/3554821.3554870
|
[5] |
TU J, FAN J, TANG N, et al. Unicorn: A unified multi-tasking model for supporting matching tasks in data integration[J]. Proceedings of the ACM on Management of Data, 2023, 1(1): 1-26.
|
[6] |
GU J, LAN X, HAO Y, et al. Arana: a cross-domain workflow scheduling system[C]. 3rd International Conference on Wireless Communication and Sensor Networks (WCSN 2016), Atlantis Press, 2016: 334-337.
|
[7] |
BAO C, SHENG M, ZHOU D, et al. Towards Intelligent Cross-Domain Resource Coordinate Scheduling for Satellite Networks[C]. IEEE Transactions on Wireless Communications, 2023.
|
[8] |
BRAUN L, DEMMLER D, SCHNEIDER T, et al. Motion-a framework for mixed-protocol multi-party computation[J]. ACM Transactions on Privacy and Security, 2022, 25: 1-35.
|
[9] |
AMIRI M J, AGRAWAL D, EL ABBADI A. Permissioned blockchains: Properties, techniques and applications[C]. Proceedings of the 2021 International Conference on Management of Data, 2021:2813-2820.
|
[10] |
CHEN Q, SHI S, LI X, et al. SDN-based privacy preserving cross domain routing[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 16(6): 930-943.
doi: 10.1109/TDSC.8858
|
[11] |
FIORETTO F, TRAN C, VAN HENTENRYCK P, et al. 2022. Differential privacy and fairness in decisions and learning tasks: A survey[J]. arXiv:2202. 08187. [2023-04-24]. https://arxiv.org/abs/2202.08187.
|
[12] |
BLUM M, DE SANTIS A, MICALI S, et al. Noninteractive zero-knowledge[J]. SIAM Journal on Computing, 1991, 20: 1084-1118.
doi: 10.1137/0220068
|
[13] |
MAYMOUNKOV P, MAZIERES D. Kademlia: A peer-to-peer information system based on the xor metric[M]. Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA, USA, March 7-8, 2002 Revised Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002: 53-65.
|
[14] |
GOLDREICH O. Secure multi-party computation[J]. Manuscript. Preliminary version, 1998, 78(110).
|
[15] |
KNOTT B, VENKATARAMAN S, HANNUN A, et al. Crypten: Secure multi-party computation meets machine learning[J]. Advances in Neural Information Processing Systems, 2021, 34: 4961-4973.
|
[16] |
VASWANI A, SHAZEER N, PARMAR N, et al. Attention is all you need[J]. Advances in neural information processing systems, 2017, 30.
|