Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment
暂无分享,去创建一个
[1] Rajarshi Shahu,et al. K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data , 2016 .
[2] Laurence T. Yang,et al. Role-Dependent Privacy Preservation for Secure V2G Networks in the Smart Grid , 2014, IEEE Transactions on Information Forensics and Security.
[3] Christos Faloutsos,et al. HaTen2: Billion-scale tensor decompositions , 2015, 2015 IEEE 31st International Conference on Data Engineering.
[4] Minyi Guo,et al. High-Performance Computing : Paradigm and Infrastructure , 2005 .
[5] Marina Blanton. Achieving Full Security in Privacy-Preserving Data Mining , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[6] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[7] Rafail Ostrovsky,et al. Secure two-party k-means clustering , 2007, CCS '07.
[8] Laurence T. Yang,et al. A Tensor-Train Deep Computation Model for Industry Informatics Big Data Feature Learning , 2018, IEEE Transactions on Industrial Informatics.
[9] Yiwei Thomas Hou,et al. Privacy-preserving pattern matching over encrypted genetic data in cloud computing , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[10] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[11] Victor C. M. Leung,et al. A Novel Sensory Data Processing Framework to Integrate Sensor Networks With Mobile Cloud , 2016, IEEE Systems Journal.
[12] Li Wan,et al. Privacy-Preserving Gradient-Descent Methods , 2010, IEEE Transactions on Knowledge and Data Engineering.
[13] Taneli Mielikäinen,et al. Cryptographically private support vector machines , 2006, KDD '06.
[14] Wei Jiang,et al. An efficient and probabilistic secure bit-decomposition , 2013, ASIA CCS '13.
[15] Jian Pei,et al. Secure Skyline Queries on Cloud Platform , 2017, 2017 IEEE 33rd International Conference on Data Engineering (ICDE).
[16] Thijs Veugen,et al. Encrypted integer division and secure comparison , 2014, Int. J. Appl. Cryptogr..
[17] Laurence T. Yang,et al. Scheduling in Distributed Computing Systems: Analysis, Design and Models , 2008 .
[18] Christos Faloutsos,et al. GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries , 2012, KDD.
[19] Laurence T. Yang,et al. Aggregated-Proofs Based Privacy-Preserving Authentication for V2G Networks in the Smart Grid , 2012, IEEE Transactions on Smart Grid.
[20] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[21] Muttukrishnan Rajarajan,et al. Efficient Privacy-Preserving Facial Expression Classification , 2017, IEEE Transactions on Dependable and Secure Computing.
[22] Laurence T. Yang,et al. Tensor-based Big Biometric Data Reduction in Cloud , 2018, IEEE Cloud Computing.
[23] Laurence T. Yang,et al. An improved parallel block Lanczos algorithm over GF(2) for integer factorization , 2017, Inf. Sci..
[24] Muttukrishnan Rajarajan,et al. Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification , 2014, IEEE Journal of Biomedical and Health Informatics.
[25] Joseph K. Liu,et al. Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data , 2020, IEEE Transactions on Dependable and Secure Computing.
[26] Zekeriya Erkin,et al. Secure Comparison Protocols in the Semi-Honest Model , 2015, IEEE Journal of Selected Topics in Signal Processing.
[27] Philip S. Yu,et al. Privacy-Preserving Singular Value Decomposition , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[28] Octavian Catrina,et al. Secure Computation with Fixed-Point Numbers , 2010, Financial Cryptography.
[29] Mikhail J. Atallah,et al. Private collaborative forecasting and benchmarking , 2004, WPES '04.
[30] Yousef Saad,et al. Cucheb: A GPU implementation of the filtered Lanczos procedure , 2017, Comput. Phys. Commun..
[31] Laurence T. Yang,et al. Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies , 2017, IEEE Internet of Things Journal.
[32] Manuel Liedel. Secure Distributed Computation of the Square Root and Applications , 2012, ISPEC.
[33] Robert H. Deng,et al. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud , 2019, IEEE Transactions on Big Data.