On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification
暂无分享,去创建一个
Mingwu Zhang | Yining Liu | Jian Wang | Youwen Zhu | Zhe Liu | Xingxin Li | Zhe Liu | Jian Wang | Xingxin Li | Youwen Zhu | Mingwu Zhang | Yining Liu | Mingwu Zhang
[1] Ahmad-Reza Sadeghi,et al. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..
[2] Zhuo Yang,et al. MAC protocol identification using support vector machines for cognitive radio networks , 2014, IEEE Wireless Communications.
[3] E. Kushilevitz. Foundations of Cryptography Foundations of Cryptography , 2014 .
[4] Bin Gu,et al. A Robust Regularization Path Algorithm for $\nu $ -Support Vector Classification , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[5] Ravi Sankar,et al. Time Series Prediction Using Support Vector Machines: A Survey , 2009, IEEE Computational Intelligence Magazine.
[6] Daphne Koller,et al. Support Vector Machine Active Learning with Applications to Text Classification , 2000, J. Mach. Learn. Res..
[7] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[8] Juan A. Garay,et al. Practical and Secure Solutions for Integer Comparison , 2007, Public Key Cryptography.
[9] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[10] A. Atiya,et al. Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond , 2005, IEEE Transactions on Neural Networks.
[11] Kun Liu,et al. Client-side web mining for community formation in peer-to-peer environments , 2006, SKDD.
[12] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[13] Ivan Damgård,et al. Efficient and Secure Comparison for On-Line Auctions , 2007, ACISP.
[14] Myeongsu Kang,et al. Reliable Fault Diagnosis for Low-Speed Bearings Using Individually Trained Support Vector Machines With Kernel Discriminative Feature Analysis , 2015, IEEE Transactions on Power Electronics.
[15] Muttukrishnan Rajarajan,et al. Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud , 2014, IEEE Transactions on Dependable and Secure Computing.
[16] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[17] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[18] Alexander J. Smola,et al. Learning with Kernels: support vector machines, regularization, optimization, and beyond , 2001, Adaptive computation and machine learning series.