Homo-ELM: fully homomorphic extreme learning machine
暂无分享,去创建一个
Chi-Man Vong | Yanfen Gan | Weiru Wang | Chuangquan Chen | C. Vong | Chuangquan Chen | Yanfen Gan | Weiru Wang
[1] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[2] Qiangfu Zhao,et al. An ELM-Based Privacy Preserving Protocol for Implementing Aware Agents , 2017, 2017 3rd IEEE International Conference on Cybernetics (CYBCON).
[3] Xia Liu,et al. Is Extreme Learning Machine Feasible? A Theoretical Assessment (Part I) , 2015, IEEE Trans. Neural Networks Learn. Syst..
[4] Qiangfu Zhao,et al. An ELM-based privacy preserving protocol for cloud systems , 2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI).
[5] Narasimhan Sundararajan,et al. Online Sequential Fuzzy Extreme Learning Machine for Function Approximation and Classification Problems , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[6] Wenfen Liu,et al. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption , 2018, IEEE Transactions on Cloud Computing.
[7] Craig Gentry,et al. (Leveled) Fully Homomorphic Encryption without Bootstrapping , 2014, ACM Trans. Comput. Theory.
[8] Cong Wang,et al. GELU-Net: A Globally Encrypted, Locally Unencrypted Deep Neural Network for Privacy-Preserved Learning , 2018, IJCAI.
[9] Ali Miri,et al. Privacy-preserving back-propagation and extreme learning machine algorithms , 2012, Data Knowl. Eng..
[10] Fevzullah Temurtas,et al. A Study on Neural Networks Using Taylor Series Expansion of Sigmoid Activation Function , 2004, ICCSA.
[11] Yuansong Qiao,et al. Chaotic Searchable Encryption for Mobile Cloud Storage , 2018, IEEE Transactions on Cloud Computing.
[12] Guang-Bin Huang,et al. ELM based smile detection using Distance Vector , 2018, Pattern Recognit..
[13] Ran Wang,et al. Noniterative Deep Learning: Incorporating Restricted Boltzmann Machine Into Multilayer Random Weight Neural Networks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[14] Jacques Stern,et al. A new public key cryptosystem based on higher residues , 1998, CCS '98.
[15] Hai-Jun Rong,et al. Aircraft recognition using modular extreme learning machine , 2014, Neurocomputing.
[16] Ran Wang,et al. Discovering the Relationship Between Generalization and Uncertainty by Incorporating Complexity of Classification , 2018, IEEE Transactions on Cybernetics.
[17] SchmidhuberJürgen. Deep learning in neural networks , 2015 .
[18] Fuchun Sun,et al. Efficient and Rapid Machine Learning Algorithms for Big Data and Dynamic Varying Systems , 2017, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[19] Shiho Moriai,et al. Privacy preserving extreme learning machine using additively homomorphic encryption , 2017, 2017 IEEE Symposium Series on Computational Intelligence (SSCI).
[20] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[21] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[22] Jürgen Schmidhuber,et al. Deep learning in neural networks: An overview , 2014, Neural Networks.
[23] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[24] Victor C. S. Lee,et al. TaxiRec: Recommending Road Clusters to Taxi Drivers Using Ranking-Based Extreme Learning Machines , 2018, IEEE Trans. Knowl. Data Eng..
[25] Hongming Zhou,et al. Extreme Learning Machine for Regression and Multiclass Classification , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[26] Chi-Man Vong,et al. Encrypted image classification based on multilayer extreme learning machine , 2017, Multidimens. Syst. Signal Process..
[27] Sam Kwong,et al. Incorporating Diversity and Informativeness in Multiple-Instance Active Learning , 2017, IEEE Transactions on Fuzzy Systems.
[28] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[29] Chaouki T. Abdallah,et al. Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud , 2018, IEEE Transactions on Cloud Computing.
[30] Chin-Laung Lei,et al. Audit-Free Cloud Storage via Deniable Attribute-Based Encryption , 2018, IEEE Transactions on Cloud Computing.
[31] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[32] Ferhat Özgür Çatak,et al. CPP-ELM: Cryptographically Privacy-Preserving Extreme Learning Machine for Cloud Systems , 2018, Int. J. Comput. Intell. Syst..
[33] Andreas Peter,et al. A Survey of Provably Secure Searchable Encryption , 2014, ACM Comput. Surv..
[34] Lily Rachmawati,et al. Exploiting AIS Data for Intelligent Maritime Navigation: A Comprehensive Survey From Data to Methodology , 2016, IEEE Transactions on Intelligent Transportation Systems.
[35] Xizhao Wang,et al. A review on neural networks with random weights , 2018, Neurocomputing.
[36] Chee Kheong Siew,et al. Extreme learning machine: Theory and applications , 2006, Neurocomputing.
[37] Qiang Yang,et al. A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.
[38] Amaury Lendasse,et al. Advances in extreme learning machines (ELM2014) , 2011, Neurocomputing.
[39] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.