Covert learning: how to learn with an untrusted intermediary
From MaRDI portal
Publication:2697884
DOI10.1007/978-3-030-90456-2_1OpenAlexW3214554555MaRDI QIDQ2697884
Publication date: 13 April 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-90456-2_1
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Artificial intelligence (68Txx)
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- An efficient membership-query algorithm for learning DNF with respect to the uniform distribution
- Cryptographic sensing
- Tolerant property testing and distance approximation
- Covert learning: how to learn with an untrusted intermediary
- Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN
- Cryptography from Learning Parity with Noise
- What Can We Learn Privately?
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Learning Monotone Decision Trees in Polynomial Time
- Learning Decision Trees Using the Fourier Spectrum
- Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN
This page was built for publication: Covert learning: how to learn with an untrusted intermediary