Medical Diagnostics Based on Encrypted Medical Data
暂无分享,去创建一个
Delaram Kahrobaei | S. Mohamad R. Soroushmehr | Kayvan Najarian | Vladimir Shpilrain | Jonathan Gryak | Alexey Gribov | Kelsey Horan | V. Shpilrain | Delaram Kahrobaei | K. Najarian | S. Soroushmehr | Kelsey Horan | A. Gribov | Jonathan Gryak
[1] Anand D. Sarwate,et al. Signal Processing and Machine Learning with Differential Privacy: Algorithms and Challenges for Continuous Data , 2013, IEEE Signal Processing Magazine.
[2] Nicolas Gama,et al. Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds , 2016, ASIACRYPT.
[3] Wei Zhang,et al. Encrypted SVM for Outsourced Data Mining , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[4] S. Thacker,et al. HIPAA privacy rule and public health. Guidance from CDC and the U.S. Department of Health and Human Services. , 2003, MMWR supplements.
[5] Jianqiang Li,et al. A hybrid solution for privacy preserving medical data sharing in the cloud environment , 2015, Future Gener. Comput. Syst..
[6] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[7] S. Fienberg,et al. Secure multiple linear regression based on homomorphic encryption , 2011 .
[8] Yunghsiang Sam Han,et al. Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.
[9] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[10] Max A. Little,et al. Accurate Telemonitoring of Parkinson's Disease Progression by Noninvasive Speech Tests , 2009, IEEE Transactions on Biomedical Engineering.
[11] Michael Naehrig,et al. Private Computation on Encrypted Genomic Data , 2014, LATINCRYPT.
[12] Louis J. M. Aslett,et al. A review of homomorphic encryption and software tools for encrypted statistical machine learning , 2015, ArXiv.
[13] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[14] Jonathan Katz,et al. Efficient Privacy-Preserving Biometric Identification , 2011, NDSS.
[15] Dima Grigoriev,et al. Homomorphic public-key cryptosystems over groups and rings , 2003, ArXiv.
[16] Delaram Kahrobaei,et al. Practical private-key fully homomorphic encryption in rings , 2018, Groups Complex. Cryptol..
[17] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[18] Léo Ducas,et al. FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second , 2015, EUROCRYPT.
[19] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[20] Yoshinori Aono,et al. Scalable and Secure Logistic Regression via Homomorphic Encryption , 2016, IACR Cryptol. ePrint Arch..
[21] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[22] Andreas S. Weigend,et al. Multi-Channel Physiological Data: Description and Analysis (Data Set B) , 2018 .
[23] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[24] Jenna Wiens,et al. A study in transfer learning: leveraging data from multiple hospitals to enhance hospital-specific predictions , 2014, J. Am. Medical Informatics Assoc..
[25] T. Poggio,et al. The Mathematics of Learning: Dealing with Data , 2005, 2005 International Conference on Neural Networks and Brain.
[26] Beata Strack,et al. Impact of HbA1c Measurement on Hospital Readmission Rates: Analysis of 70,000 Clinical Database Patient Records , 2014, BioMed research international.
[27] Craig Gentry,et al. Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.
[28] Michael Naehrig,et al. Private Predictive Analysis on Encrypted Medical Data , 2014, IACR Cryptol. ePrint Arch..
[29] Michael Naehrig,et al. ML Confidential: Machine Learning on Encrypted Data , 2012, ICISC.
[30] Yin Yang,et al. Functional Mechanism: Regression Analysis under Differential Privacy , 2012, Proc. VLDB Endow..
[31] Lennart Ljung,et al. System Identification: Theory for the User , 1987 .
[32] Shai Halevi,et al. Algorithms in HElib , 2014, CRYPTO.
[33] P. Strappe,et al. Gene Modification of Mesenchymal Stem Cells and Articular Chondrocytes to Enhance Chondrogenesis , 2014, BioMed research international.
[34] Stratis Ioannidis,et al. Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.
[35] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[36] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[37] S. Thacker. HIPAA Privacy Rule and Public Health , 2003 .
[38] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.