Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing
暂无分享,去创建一个
Ximeng Liu | Kim-Kwang Raymond Choo | Zhuoran Ma | Jianfeng Ma | Yinbin Miao | Yang Ruikang | Wang Xiangyu | Ximeng Liu | Jianfeng Ma | Yinbin Miao | K. Choo | Zhuo Ma | Ruikang Yang | Xiangyu Wang
[1] Robert H. Deng,et al. Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything , 2019, IEEE Internet of Things Journal.
[2] Yi Mu,et al. Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization , 2019, IEEE Transactions on Services Computing.
[3] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[4] Xu Chen,et al. Adaptive User-managed Service Placement for Mobile Edge Computing: An Online Learning Approach , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[5] Robert H. Deng,et al. Hybrid privacy-preserving clinical decision support system in fog-cloud computing , 2018, Future Gener. Comput. Syst..
[6] Hengrun Zhang,et al. Pairwise Markov Chain: A Task Scheduling Strategy for Privacy-Preserving SIFT on Edge , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[7] Dan Liu,et al. A Survey on Secure Data Analytics in Edge Computing , 2019, IEEE Internet of Things Journal.
[8] Tianqi Chen,et al. XGBoost: A Scalable Tree Boosting System , 2016, KDD.
[9] Der-Jiunn Deng,et al. Smart Manufacturing Scheduling With Edge Computing Using Multiclass Deep Q Network , 2019, IEEE Transactions on Industrial Informatics.
[10] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[11] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[12] Yang Song,et al. Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning , 2018, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[13] Jianfeng Ma,et al. Privacy-preserving and high-accurate outsourced disease predictor on random forest , 2019, Inf. Sci..
[14] W. Marsden. I and J , 2012 .
[15] Qian Wang,et al. Outsourced Biometric Identification With Privacy , 2018, IEEE Transactions on Information Forensics and Security.
[16] Xuemin Shen,et al. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.
[17] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[18] Neil Genzlinger. A. and Q , 2006 .
[19] Xiaodong Lin,et al. HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems , 2018, IEEE Transactions on Industrial Informatics.
[20] Robert H. Deng,et al. Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things , 2019, IEEE Internet of Things Journal.
[21] Qing-Guo Wang,et al. XGBoost Model for Chronic Kidney Disease Diagnosis , 2020, IEEE/ACM Transactions on Computational Biology and Bioinformatics.
[22] Mingzhe Jiang,et al. Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach , 2018, Future Gener. Comput. Syst..
[23] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[24] Igor Kononenko,et al. Machine learning for medical diagnosis: history, state of the art and perspective , 2001, Artif. Intell. Medicine.
[25] Mohammad Al-Rubaie,et al. Privacy-Preserving Machine Learning: Threats and Solutions , 2018, IEEE Security & Privacy.
[26] Xiaodong Lin,et al. Privacy preserving regression modelling via distributed computation , 2004, KDD.
[27] W. Hager,et al. and s , 2019, Shallow Water Hydraulics.
[28] Robert H. Deng,et al. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers , 2018, IEEE Transactions on Dependable and Secure Computing.
[29] A. Ravishankar Rao,et al. A fully integrated open-source toolkit for mining healthcare big-data: architecture and applications , 2016, 2016 IEEE International Conference on Healthcare Informatics (ICHI).
[30] Jianfeng Ma,et al. PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting , 2020, Future Gener. Comput. Syst..
[31] Pei Liu,et al. Predicting Invasive Disease-Free Survival for Early Stage Breast Cancer Patients Using Follow-Up Clinical Data , 2019, IEEE Transactions on Biomedical Engineering.
[32] Rajiv Ranjan,et al. SAFE: SDN-Assisted Framework for Edge–Cloud Interplay in Secure Healthcare Ecosystem , 2019, IEEE Transactions on Industrial Informatics.
[33] Haitian Pang,et al. Intelligent Edge-Assisted Crowdcast with Deep Reinforcement Learning for Personalized QoE , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[34] Jianfeng Ma,et al. Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing , 2018, IEEE Internet of Things Journal.
[35] Lynn A. Karoly,et al. Health Insurance Portability and Accountability Act of 1996 (HIPAA) Administrative Simplification , 2010, Practice Management Consultant.
[36] Victor C. S. Lee,et al. A Learning Algorithm for Real-Time Service in Vehicular Networks with Mobile-Edge Computing , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[37] P. Alam. ‘L’ , 2021, Composites Engineering: An A–Z Guide.
[38] Yanjiao Chen,et al. Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training , 2018, IEEE Transactions on Knowledge and Data Engineering.
[39] Robert H. Deng,et al. Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things , 2019, IEEE Transactions on Industrial Informatics.
[40] Maria Fazio,et al. An Innovative Methodology for Big Data Visualization for Telemedicine , 2019, IEEE Transactions on Industrial Informatics.
[41] Jianfeng Ma,et al. Privacy-Preserving Diverse Keyword Search and Online Pre-Diagnosis in Cloud Computing , 2022, IEEE Transactions on Services Computing.
[42] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[43] Agustí Verde Parera,et al. General data protection regulation , 2018 .
[44] Tomohiro Kuroda,et al. Computer-aided diagnosis of lung nodule using gradient tree boosting and Bayesian optimization , 2017, PloS one.
[45] Saraju P. Mohanty,et al. eSeiz: An Edge-Device for Accurate Seizure Detection for Smart Healthcare , 2019, IEEE Transactions on Consumer Electronics.
[46] Ximeng Liu,et al. An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.
[47] Tong Li,et al. Outsourced privacy-preserving classification service over encrypted data , 2018, J. Netw. Comput. Appl..
[48] Kim-Kwang Raymond Choo,et al. Enabling verifiable multiple keywords search over encrypted cloud data , 2018, Inf. Sci..
[49] Jaideep Vaidya,et al. Privacy-Preserving SVM Classification on Vertically Partitioned Data , 2006, PAKDD.
[50] P. Alam. ‘S’ , 2021, Composites Engineering: An A–Z Guide.
[51] Qiang Yang,et al. SecureBoost: A Lossless Federated Learning Framework , 2019, IEEE Intelligent Systems.
[52] Robert H. Deng,et al. Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting , 2019, IEEE Transactions on Dependable and Secure Computing.
[53] D. Blumenthal,et al. Achieving a Nationwide Learning Health System , 2010, Science Translational Medicine.