Efficient and Secure Outsourced Linear Regression
暂无分享,去创建一个
[1] Kousha Etessami,et al. Recursive Markov chains, stochastic grammars, and monotone systems of nonlinear equations , 2005, JACM.
[2] Joshua Zhexue Huang,et al. Extensions to the k-Means Algorithm for Clustering Large Data Sets with Categorical Values , 1998, Data Mining and Knowledge Discovery.
[3] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[4] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[5] Roger Fletcher,et al. A Rapidly Convergent Descent Method for Minimization , 1963, Comput. J..
[6] S. Wold,et al. The Collinearity Problem in Linear Regression. The Partial Least Squares (PLS) Approach to Generalized Inverses , 1984 .
[7] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[8] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[9] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[10] Amit Sahai,et al. Secure Multi-Party Computation , 2013 .
[11] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[12] Gregory W. Wornell,et al. Efficient homomorphic encryption on integer vectors and its applications , 2014, 2014 Information Theory and Applications Workshop (ITA).
[13] Benny Pinkas,et al. FairplayMP: a system for secure multi-party computation , 2008, CCS.
[14] Daniel A. Spielman,et al. Spectral Graph Theory and its Applications , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[15] Khaled El Emam,et al. The application of differential privacy to health data , 2012, EDBT-ICDT '12.
[16] Lisa M. Lee,et al. Ethical collection, storage, and use of public health data: a proposal for a national privacy protection. , 2009, JAMA.