Privacy-Preserving Support Vector Machine Computing Using Random Unitary Transformation
暂无分享,去创建一个
[1] Hitoshi Kiya,et al. An Encryption-then-Compression System for JPEG/Motion JPEG Standard , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[2] Hitoshi Kiya,et al. Unitary Transform-Based Template Protection and Its Application to l2-norm Minimization Problems , 2016, IEICE Trans. Inf. Syst..
[3] Ramesh Govindan,et al. P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.
[4] Mauro Barni,et al. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.
[5] Hitoshi Kiya,et al. Grayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems , 2019, APSIPA Transactions on Signal and Information Processing.
[6] Hitoshi Kiya,et al. Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images , 2018, IEEE Transactions on Information Forensics and Security.
[7] Marc G. Genton,et al. Classes of Kernels for Machine Learning: A Statistics Perspective , 2002, J. Mach. Learn. Res..
[8] Yoshinori Aono,et al. Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption , 2016, IEICE Trans. Inf. Syst..
[9] Mauro Barni,et al. Private Computing with Garbled Circuits [Applications Corner] , 2013, IEEE Signal Processing Magazine.
[10] Hitoshi Kiya,et al. One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images , 2009, EURASIP J. Inf. Secur..
[11] Noboru Babaguchi,et al. Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information Services , 2019, IEEE Transactions on Information Forensics and Security.
[12] Yehuda Lindell,et al. Optimized Honest-Majority MPC for Malicious Adversaries — Breaking the 1 Billion-Gate Per Second Barrier , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[13] David J. Kriegman,et al. From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[14] Jun Sakuma,et al. Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data , 2016, NDSS.
[15] Hitoshi Kiya,et al. An encryption-then-compression system for JPEG standard , 2015, 2015 Picture Coding Symposium (PCS).
[16] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[17] Hitoshi Kiya,et al. Unitary transform-based template protection and its properties , 2015, 2015 23rd European Signal Processing Conference (EUSIPCO).
[18] B. Suneetha,et al. Designing an Efficient Image Encryption-then Compression System , 2015 .
[19] Allen Y. Yang,et al. Robust Face Recognition via Sparse Representation , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[20] Anil K. Jain,et al. Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.
[21] Hitoshi Kiya,et al. On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[22] Hitoshi Kiya,et al. Security evaluation for block scrambling-based ETC systems against extended jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Multimedia and Expo (ICME).
[23] Mauro Barni,et al. Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing , 2015, IEEE Signal Processing Magazine.
[24] Yehuda Lindell,et al. High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority , 2016, IACR Cryptol. ePrint Arch..
[25] Shantanu Rane,et al. Standardization of Biometric Template Protection , 2014, IEEE MultiMedia.
[26] Vijay Varadharajan,et al. Apsipa Transactions on Signal and Information Processing Additional Services for Apsipa Transactions on Signal and Information Processing: Survey on Securing Data Storage in the Cloud , 2022 .