Cited By
View all- Wang ZZhou Y(2025)Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things ScenariosFuture Internet10.3390/fi1701003217:1(32)Online publication date: 13-Jan-2025
- Jin JChuengsatiansup CMurray TRubinstein BYarom YOhrimenko OLuo BLiao XXu JKirda ELie D(2024)Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy BudgetProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670281(1909-1923)Online publication date: 2-Dec-2024
- Wang HCai YWang JMa CGe CQu XZhou L(2024)Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning AggregationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347253119(9744-9759)Online publication date: 2024
- Show More Cited By