Protecting Privacy of Users in Brain-Computer Interface Applications
暂无分享,去创建一个
Dongrui Wu | Chin-Teng Lin | Rafael Dowsley | Anisha Agarwal | Nicholas D. McKinney | Martine De Cock | Nicholas D. McKinney | Anderson C. A. Nascimento | Dongrui Wu | Chin-Teng Lin | Rafael Dowsley | A. Nascimento | Martine De Cock | Anisha Agarwal
[1] Rafael Dowsley,et al. Cryptography Based on Correlated Data: Foundations and Practice , 2016 .
[2] Xiaodong Lin,et al. Secure Regression on Distributed Databases , 2005 .
[3] S. Makeig,et al. Lapses in alertness: coherence of fluctuations in performance and EEG spectrum. , 1993, Electroencephalography and clinical neurophysiology.
[4] Christian Mühl,et al. Guessing what ' s on your mind : Using the N 400 in Brain Computer Interfaces , 2010 .
[5] Yoshinori Aono,et al. Fast and Secure Linear Regression and Biometric Authentication with Security Update , 2015, IACR Cryptol. ePrint Arch..
[6] Howard Jay Chizeck,et al. App Stores for the Brain : Privacy and Security in Brain-Computer Interfaces , 2015, IEEE Technology and Society Magazine.
[7] Benny Pinkas,et al. FairplayMP: a system for secure multi-party computation , 2008, CCS.
[8] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[9] Wenliang Du,et al. Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.
[10] Farinaz Koushanfar,et al. Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications , 2018, IACR Cryptol. ePrint Arch..
[11] Cuntai Guan,et al. Brain-computer-interface-based intervention re-normalizes brain functional network topology in children with attention deficit/hyperactivity disorder , 2018, Translational Psychiatry.
[12] Yuan-Pin Lin,et al. Selective Transfer Learning for EEG-Based Drowsiness Detection , 2015, 2015 IEEE International Conference on Systems, Man, and Cybernetics.
[13] Jing Wang,et al. Predicting the brain activation pattern associated with the propositional content of a sentence: Modeling neural representations of events and states , 2017, Human brain mapping.
[14] Bhavani M. Thuraisingham,et al. Securing Data Analytics on SGX with Randomization , 2017, ESORICS.
[15] Donald Beaver,et al. Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.
[16] Goichiro Hanaoka,et al. Information-theoretically secure oblivious polynomial evaluation in the commodity-based model , 2014, International Journal of Information Security.
[17] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[18] Jeroen van de Graaf,et al. Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra , 2016, IEEE Transactions on Information Forensics and Security.
[19] Jerome P. Reiter,et al. Privacy-Preserving Analysis of Vertically Partitioned Data Using Secure Matrix Products , 2009 .
[20] Maryam Gholami Doborjeh,et al. Attentional Bias Pattern Recognition in Spiking Neural Networks from Spatio-Temporal EEG Data , 2018, Cognitive Computation.
[21] Anat Paskin-Cherniavsky,et al. On the Power of Correlated Randomness in Secure Computation , 2013, TCC.
[22] Sarvar Patel,et al. Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..
[23] Tao Xiang,et al. Highly Efficient Linear Regression Outsourcing to a Cloud , 2014, IEEE Transactions on Cloud Computing.
[24] Xiaodong Lin,et al. Privacy preserving regression modelling via distributed computation , 2004, KDD.
[25] Anderson C. A. Nascimento,et al. Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation , 2019, IEEE Transactions on Dependable and Secure Computing.
[26] Mariana Raykova,et al. Privacy-Preserving Distributed Linear Regression on High-Dimensional Data , 2017, Proc. Priv. Enhancing Technol..
[27] Anderson C. A. Nascimento,et al. Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols , 2015, ProvSec.
[28] Jeroen van de Graaf,et al. A Two-Party Protocol with Trusted Initializer for Computing the Inner Product , 2010, WISA.
[29] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[30] Howard Jay Chizeck,et al. App stores for the brain: Privacy & security in Brain-Computer Interfaces , 2014, 2014 IEEE International Symposium on Ethics in Science, Technology and Engineering.
[31] Donald Beaver,et al. Precomputing Oblivious Transfer , 1995, CRYPTO.
[32] Martine De Cock,et al. Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data , 2015, AISec@CCS.
[33] Ivan Damgård,et al. Secure Multiparty Computation and Secret Sharing , 2015 .
[34] Changde Du,et al. Sharing deep generative representation for perceived image reconstruction from human brain activity , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[35] InitializerRonald L. RivestLaboratory. Unconditionally Secure Commitment and Oblivious Transfer Schemes Using Private Channels and a Trusted Initializer , 1999 .
[36] Martine De Cock,et al. Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[37] S. Fienberg,et al. Secure multiple linear regression based on homomorphic encryption , 2011 .
[38] Donald Beaver,et al. One-Time Tables for Two-Party Computation , 1998, COCOON.
[39] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[40] Chin-Teng Lin,et al. Privacy-Preserving Linear Regression for Brain-Computer Interface Applications , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[41] Kyle Nash,et al. Neural Markers of Religious Conviction , 2009, Psychological science.
[42] Stratis Ioannidis,et al. Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.
[43] Yunghsiang Sam Han,et al. Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.
[44] Niall Holmes,et al. Moving magnetoencephalography towards real-world applications with a wearable system , 2018, Nature.
[45] Brent Lance,et al. Driver Drowsiness Estimation From EEG Signals Using Online Weighted Adaptation Regularization for Regression (OwARR) , 2017, IEEE Transactions on Fuzzy Systems.
[46] Octavian Catrina,et al. Secure Computation with Fixed-Point Numbers , 2010, Financial Cryptography.
[47] Philip S. Yu,et al. A General Survey of Privacy-Preserving Data Mining Models and Algorithms , 2008, Privacy-Preserving Data Mining.
[48] Goichiro Hanaoka,et al. Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data , 2009, IACR Cryptol. ePrint Arch..
[49] Ping Chen,et al. Practical Secure Decision Tree Learning in a Teletreatment Application , 2014, Financial Cryptography.
[50] Dawn Xiaodong Song,et al. On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces , 2012, USENIX Security Symposium.