2023
DOI: 10.3390/electronics12163491
|View full text |Cite
|
Sign up to set email alerts
|

Secure Computation Protocol of Text Similarity against Malicious Attacks for Text Classification in Deep-Learning Technology

Xin Liu,
Ruxue Wang,
Dan Luo
et al.

Abstract: With the development of deep learning, the demand for similarity matching between texts in text classification is becoming increasingly high. How to match texts quickly under the premise of keeping private information secure has become a research hotspot. However, most existing protocols currently have full set limitations, and the applicability of these methods is limited when the data size is large and scattered. Therefore, this paper applies the secure vector calculation method for text similarity matching … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 21 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?