Table of contents
Trusted Execution Environment Trusted Execution Environment
Privacy Computing
Privacy computing can not only conduct training and learning with all parties, but also ensure that the private teaching data of all parties are not leaked. Privacy computing technologies can be grouped into three categories
Data encryption and reprocessing, data does not move but models move,