News
Since the encryption scheme only supports polynomial operations, the authors simply use square activation as a substitution of the conventional activations, obtaining a relatively low prediction ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results