Privacy-preserving back-propagation and extreme learning machine algorithms
暂无分享,去创建一个
Ali Miri | Saeed Samet | A. Miri | S. Samet | Saeed Samet
[1] J. Nadal,et al. Learning in feedforward layered networks: the tiling algorithm , 1989 .
[2] Benjamin C. M. Fung,et al. Privacy-preserving data publishing for cluster analysis , 2009, Data Knowl. Eng..
[3] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[4] William H. Beyer,et al. CRC standard mathematical tables , 1976 .
[5] Li Wan,et al. Privacy-preservation for gradient descent methods , 2007, KDD '07.
[6] Stefanos Gritzalis,et al. Accurate and large-scale privacy-preserving data mining using the election paradigm , 2009, Data Knowl. Eng..
[7] Jin-Long Wang,et al. An Incremental Algorithm for Mining Privacy-Preserving Frequent Itemsets , 2006, 2006 International Conference on Machine Learning and Cybernetics.
[8] Sheng Zhong,et al. Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data , 2011, Neural Computing and Applications.
[9] Gregory F. Cooper,et al. The ALARM Monitoring System: A Case Study with two Probabilistic Inference Techniques for Belief Networks , 1989, AIME.
[10] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[11] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[12] Chris Clifton,et al. Privacy-Preserving Decision Trees over Vertically Partitioned Data , 2005, DBSec.
[13] Stephen I. Gallant,et al. Neural network learning and expert systems , 1993 .
[14] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[15] D. Serre. Matrices: Theory and Applications , 2002 .
[16] Murat Kantarcioglu,et al. Formal anonymity models for efficient privacy-preserving joins , 2009, Data Knowl. Eng..
[17] Michael Georgiopoulos,et al. A Privacy Preserving Probabilistic Neural Network for Horizontally Partitioned Databases , 2007, 2007 International Joint Conference on Neural Networks.
[18] Mauro Barni,et al. A privacy-preserving protocol for neural-network-based computation , 2006, MM&Sec '06.
[19] Luis Orozco-Barbosa,et al. Privacy Preserving k-Means Clustering in Multi-Party Environment , 2007, SECRYPT.
[20] William E. Winkler,et al. Multiplicative Noise for Masking Continuous Data , 2001 .
[21] Chi-Jen Lu,et al. Oblivious polynomial evaluation and oblivious neural learning , 2005, Theor. Comput. Sci..
[22] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[23] K. S. Banerjee. Generalized Inverse of Matrices and Its Applications , 1973 .
[24] Philip S. Yu,et al. Privacy-Preserving Singular Value Decomposition , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[25] Sheng Zhong,et al. Privacy-Preserving Backpropagation Neural Network Learning , 2009, IEEE Transactions on Neural Networks.
[26] Ali Miri,et al. Privacy preserving ID3 using Gini Index over horizontally partitioned data , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.
[27] Ron Kohavi,et al. Scaling Up the Accuracy of Naive-Bayes Classifiers: A Decision-Tree Hybrid , 1996, KDD.
[28] Chee Kheong Siew,et al. Extreme learning machine: Theory and applications , 2006, Neurocomputing.
[29] Philip S. Yu,et al. On static and dynamic methods for condensation-based privacy-preserving data mining , 2008, TODS.
[30] Yücel Saygin,et al. Distributed privacy preserving k-means clustering with additive secret sharing , 2008, PAIS '08.
[31] Chris Clifton,et al. Defining Privacy for Data Mining , 2002 .
[32] I.S. Isa,et al. Suitable MLP Network Activation Functions for Breast Cancer and Thyroid Disease Detection , 2010, 2010 Second International Conference on Computational Intelligence, Modelling and Simulation.
[33] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[34] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[35] Yücel Saygin,et al. Privacy preserving clustering on horizontally partitioned data , 2007, Data Knowl. Eng..
[36] Yücel Saygin,et al. Recent advances in preserving privacy when mining data , 2008, Data Knowl. Eng..
[37] Christian Lebiere,et al. The Cascade-Correlation Learning Architecture , 1989, NIPS.
[38] Stephen I. Gallant,et al. Perceptron-based learning algorithms , 1990, IEEE Trans. Neural Networks.
[39] Chris Clifton,et al. A secure distributed framework for achieving k-anonymity , 2006, The VLDB Journal.
[40] Taneli Mielikäinen,et al. Cryptographically private support vector machines , 2006, KDD '06.
[41] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[42] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[43] Li Guang,et al. A Privacy Preserving Neural Network Learning Algorithm for Horizontally Partitioned Databases , 2010 .
[44] John Hawkins,et al. The applicability of recurrent neural networks for biological sequence analysis , 2005, IEEE/ACM Transactions on Computational Biology and Bioinformatics.
[45] Andrew Beng Jin Teoh,et al. Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[46] Mauro Barni,et al. Oblivious Neural Network Computing via Homomorphic Encryption , 2007, EURASIP J. Inf. Secur..
[47] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[48] Xin Yao,et al. A New Constructive Algorithm for Architectural and Functional Adaptation of Artificial Neural Networks , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[49] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[50] Jaideep Vaidya,et al. Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data , 2006, SAC.
[51] Li Liu,et al. The applicability of the perturbation based privacy preserving data mining for real-world data , 2008, Data Knowl. Eng..
[52] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[53] Stan Matwin,et al. Privacy-Preserving Collaborative Association Rule Mining , 2005, DBSec.
[54] David W. Lewis,et al. Matrix theory , 1991 .
[55] Murat Kantarcioglu,et al. Privacy-preserving data mining in the malicious model , 2008, Int. J. Inf. Comput. Secur..
[56] David J. Spiegelhalter,et al. Local computations with probabilities on graphical structures and their application to expert systems , 1990 .
[57] A. Miri,et al. Privacy-preserving protocols for perceptron learning algorithm in neural networks , 2008, 2008 4th International IEEE Conference Intelligent Systems.
[58] Shigenobu Kobayashi,et al. Large-scale k-means clustering with user-centric privacy-preservation , 2010, Knowledge and Information Systems.
[59] Shangteng Huang,et al. Data privacy protection in multi-party clustering , 2008, Data Knowl. Eng..