Privacy-preserving face detection based on linear and nonlinear kernels
暂无分享,去创建一个
Li Wang | Sheng Zhong | Chen Chen | Junjie Shi | Sheng Zhong | Chen Chen | Li Wang | Junjie Shi
[1] Bernhard Schölkopf,et al. The connection between regularization operators and support vector kernels , 1998, Neural Networks.
[2] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[3] Chengjun Liu,et al. Face detection using discriminating feature analysis and Support Vector Machine , 2006, Pattern Recognit..
[4] Shai Avidan,et al. Blind Vision , 2006, ECCV.
[5] Federico Girosi,et al. Training support vector machines: an application to face detection , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[6] Jaideep Vaidya,et al. Knowledge and Information Systems , 2007 .
[7] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[8] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[9] Hsiang-Cheh Huang,et al. Layered Access Control Schemes on Watermarked Scalable Media , 2007, J. VLSI Signal Process..
[10] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[11] Taneli Mielikäinen,et al. Cryptographically private support vector machines , 2006, KDD '06.
[12] Jeng-Shyang Pan,et al. Restricted Nearest Feature Line with Ellipse for Face Recognition , 2012, J. Inf. Hiding Multim. Signal Process..
[13] J. Daugman. Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. , 1985, Journal of the Optical Society of America. A, Optics and image science.
[14] Alimohammad Latif,et al. Visual cryptography for grayscale images using bit-level , 2014, J. Inf. Hiding Multim. Signal Process..
[15] Sheng Zhong,et al. Privacy-preserving algorithms for distributed mining of frequent itemsets , 2007, Inf. Sci..
[16] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[17] Guodong Guo,et al. Face recognition by support vector machines , 2000, Proceedings Fourth IEEE International Conference on Automatic Face and Gesture Recognition (Cat. No. PR00580).
[18] Keke Chen,et al. Privacy preserving data classification with rotation perturbation , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[19] Ming-Syan Chen,et al. Privacy-preserving outsourcing support vector machines with random transformation , 2010, KDD.
[20] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[21] Ming-Syan Chen,et al. On the Design and Analysis of the Privacy-Preserving SVM Classifier , 2011, IEEE Transactions on Knowledge and Data Engineering.
[22] Hsiang-Cheh Huang,et al. Layered Access Control Schemes on Watermarked Scalable Media , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[23] Paul A. Viola,et al. Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[24] Klaus J. Kirchberg,et al. Robust Face Detection Using the Hausdorff Distance , 2001, AVBPA.
[25] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[26] Nello Cristianini,et al. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .
[27] Hannes Federrath,et al. Privacy enhancing technologies in the Internet , 2001 .
[28] Olvi L. Mangasarian,et al. Privacy-Preserving Classification of Horizontally Partitioned Data via Random Kernels , 2008, DMIN.