Efficient distributed privacy-preserving collaborative outlier detection
暂无分享,去创建一个
[1] Xiaodong Lin,et al. Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities , 2018, IEEE Network.
[2] Basit Shafiq,et al. Differentially Private Outlier Detection in a Collaborative Environment , 2018, Int. J. Cooperative Inf. Syst..
[3] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD 2000.
[4] Xiaodong Lin,et al. PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI , 2019, Future Gener. Comput. Syst..
[5] Stratis Ioannidis,et al. Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.
[6] Yuan-Shun Dai,et al. Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds , 2018, IEEE Transactions on Emerging Topics in Computing.
[7] Mariana Raykova,et al. Outsourcing Multi-Party Computation , 2011, IACR Cryptol. ePrint Arch..
[8] Wenliang Du,et al. Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.
[9] Yehuda Lindell,et al. More efficient oblivious transfer and extensions for faster secure computation , 2013, CCS.
[10] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[11] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[12] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[13] Keqin Li,et al. A query privacy-enhanced and secure search scheme over encrypted data in cloud computing , 2017, J. Comput. Syst. Sci..
[14] Xiaodong Lin,et al. Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data , 2019, IEEE Transactions on Information Forensics and Security.
[15] Soo-Chang Pei,et al. Secure and robust SIFT , 2009, ACM Multimedia.
[16] Ke Zhang,et al. A New Local Distance-Based Outlier Detection Approach for Scattered Real-World Data , 2009, PAKDD.
[17] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[18] Alexandr Andoni,et al. Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[19] Donald Beaver,et al. Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.
[20] Chris Clifton,et al. Privacy-preserving outlier detection , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[21] Nicole Immorlica,et al. Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.
[22] Qiang Wang,et al. Towards high performance security policy evaluation , 2011, The Journal of Supercomputing.
[23] Yongdae Kim,et al. Privacy Preserving Nearest Neighbor Search , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).
[24] Haomiao Yang,et al. Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence , 2020, IEEE Transactions on Industrial Informatics.
[25] Zheng Qin,et al. An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme , 2018, Secur. Commun. Networks.
[26] Claudio Orlandi,et al. A New Approach to Practical Active-Secure Two-Party Computation , 2012, IACR Cryptol. ePrint Arch..
[27] Kan Yang,et al. VerifyNet: Secure and Verifiable Federated Learning , 2020, IEEE Transactions on Information Forensics and Security.
[28] Lu Li,et al. Privacy-preserving LOF outlier detection , 2013, Knowledge and Information Systems.
[29] Michael Zohner,et al. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation , 2015, NDSS.
[30] Robert H. Deng,et al. Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities , 2019, IEEE Communications Magazine.
[31] Yong Xiang,et al. Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data , 2020, IEEE Transactions on Cloud Computing.
[32] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[33] Mi Wen,et al. Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing Systems , 2019, IEEE Transactions on Vehicular Technology.