An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare
暂无分享,去创建一个
Xiaohu Tang | Rongxing Lu | Haomiao Yang | Xue Yang | Jun Shao | Xue Yang | Rongxing Lu | Xiaohu Tang | Haomiao Yang | Jun Shao
[1] Jaideep Vaidya,et al. Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data , 2006, SAC.
[2] Jun Zhou,et al. PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System , 2015, IEEE Transactions on Parallel and Distributed Systems.
[3] Kazunori Matsumoto,et al. Prediction for Disease Risk and Medical Cost using Time Series Healthcare Data , 2016, HEALTHINF.
[4] Azzedine Boukerche,et al. Monitoring patients via a secure and mobile healthcare system , 2010, IEEE Wireless Communications.
[5] Samina Raza Abidi,et al. Semantics-based plausible reasoning to extend the knowledge coverage of medical knowledge bases for improved clinical decision support , 2017, BioData Mining.
[6] Stratis Ioannidis,et al. Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.
[7] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[8] Chris Clifton,et al. Privacy-preserving Naïve Bayes classification , 2008, The VLDB Journal.
[9] Xiaohui Liang,et al. Security and privacy for mobile healthcare networks: from a quality of protection perspective , 2015, IEEE Wireless Communications.
[10] Yuguang Fang,et al. Privacy and emergency response in e-healthcare leveraging wireless body sensor networks , 2010, IEEE Wireless Communications.
[11] Min Ji,et al. CCA-secure ABE with outsourced decryption for fog computing , 2018, Future Gener. Comput. Syst..
[12] Zekeriya Erkin,et al. Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing , 2012, IEEE Transactions on Information Forensics and Security.
[13] M. Bonten,et al. treatment of , 2004 .
[14] Xiaohui Liang,et al. Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage , 2018, IEEE Transactions on Dependable and Secure Computing.
[15] Ming Li,et al. Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.
[16] Xiaoxia Liu,et al. Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM , 2017, IEEE Journal of Biomedical and Health Informatics.
[17] Xiaodong Lin,et al. SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.
[18] Xiaolei Dong,et al. PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems , 2015, IEEE Journal of Selected Topics in Signal Processing.
[19] Jacques Stern,et al. RSA-OAEP Is Secure under the RSA Assumption , 2001, Journal of Cryptology.
[20] Muttukrishnan Rajarajan,et al. Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification , 2014, IEEE Journal of Biomedical and Health Informatics.
[21] Xuemin Shen,et al. Security and Privacy for Mobile Healthcare Networks , 2015, Wireless Networks.
[22] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[23] Cheng Huang,et al. PSLP: Privacy-preserving single-layer perceptron learning for e-Healthcare , 2015, 2015 10th International Conference on Information, Communications and Signal Processing (ICICS).
[24] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[25] Jiming Chen,et al. Smart community: an internet of things application , 2011, IEEE Communications Magazine.
[26] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[27] Sushruta Mishra,et al. Impact of Swarm Intelligence Techniques in Diabetes Disease Risk Prediction , 2016, Int. J. Knowl. Discov. Bioinform..
[28] Xiaoyan Zhu,et al. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks , 2015, Sensors.
[29] Jianfeng Ma,et al. Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification , 2016, IEEE Journal of Biomedical and Health Informatics.
[30] Chun-Nan Hsu,et al. Why Discretization Works for Naive Bayesian Classifiers , 2000, ICML.
[31] Ji Zhang,et al. A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model for Disease Risk Prediction Using a Real-Life Dataset , 2017, PAKDD.
[32] Tzu-Tsung Wong,et al. Naïve Bayesian Classifiers with Multinomial Models for rRNA Taxonomic Assignment , 2013, IEEE/ACM Transactions on Computational Biology and Bioinformatics.
[33] Xiaolei Dong,et al. Securing m-healthcare social networks: challenges, countermeasures and future directions , 2013, IEEE Wireless Communications.
[34] Wei Jiang,et al. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data , 2014, IEEE Transactions on Knowledge and Data Engineering.
[35] ALESSANDRA TONINELLI,et al. Enabling secure service discovery in mobile healthcare enterprise networks , 2009, IEEE Wireless Communications.
[36] David L. Buckeridge,et al. Enteric disease episodes and the risk of acquiring a future sexually transmitted infection: a prediction model in Montreal residents , 2016, J. Am. Medical Informatics Assoc..
[37] Cheng Huang,et al. PGuide: An Efficient and Privacy-Preserving Smartphone-Based Pre-Clinical Guidance Scheme , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[38] Robert Clarke,et al. Risk prediction for cardiovascular disease using ECG data in the China kadoorie biobank , 2016, 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[39] G Eysenbach,et al. What is e-health? , 2001, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[40] Yun Ling,et al. Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage , 2018, IEEE Transactions on Information Forensics and Security.
[41] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[42] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[43] Seher Korkmaz,et al. A health record integrated clinical decision support system to support prescriptions of pharmaceutical drugs in patients with reduced renal function: Design, development and proof of concept , 2015, Int. J. Medical Informatics.
[44] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[45] Cong Wang,et al. Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing , 2018, IEEE Transactions on Information Forensics and Security.