[1]
G. Su, J. Wang, X. Xu, Y. Wang, and C. Wang, “The Utilization of Homomorphic Encryption Technology Grounded on Artificial Intelligence for Privacy Preservation”, IJCSIT, vol. 2, no. 1, pp. 52–58, Mar. 2024, doi: 10.62051/ijcsit.v2n1.07.