MAS-Encryption and its Applications in Privacy-Preserving Classifiers
暂无分享,去创建一个
Changyu Dong | Kim-Kwang Raymond Choo | Wenjing Lou | Jin Li | Chongzhi Gao | Shibing Xia | W. Lou | K. Choo | Jin Li | Changyu Dong | Chong-zhi Gao | Shi-bing Xia | Wenjing Lou
[1] Robert H. Deng,et al. Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery , 2020, IEEE Transactions on Cloud Computing.
[2] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2019, 2019 IEEE 26th Symposium on Computer Arithmetic (ARITH).
[3] Peter Rindal,et al. ABY3: A Mixed Protocol Framework for Machine Learning , 2018, IACR Cryptol. ePrint Arch..
[4] Mingwu Zhang,et al. On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification , 2018, IEEE Transactions on Dependable and Secure Computing.
[5] Jung Hee Cheon,et al. Homomorphic Encryption for Arithmetic of Approximate Numbers , 2017, ASIACRYPT.
[6] Francisco Javier González-Serrano,et al. Training Support Vector Machines with privacy-protected data , 2017, Pattern Recognit..
[7] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[8] Sen Bai,et al. A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud , 2017, Inf. Sci..
[9] Xiaoxia Liu,et al. Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM , 2017, IEEE Journal of Biomedical and Health Informatics.
[10] Jin Li,et al. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..
[11] Tal Malkin,et al. Garbling Gadgets for Boolean and Arithmetic Circuits , 2016, IACR Cryptol. ePrint Arch..
[12] Ana L. C. Bazzan,et al. Social choice in distributed classification tasks: Dealing with vertically partitioned data , 2016, Inf. Sci..
[13] Jianfeng Ma,et al. Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification , 2016, IEEE Journal of Biomedical and Health Informatics.
[14] Yan Li,et al. A distributed ensemble approach for mining healthcare data under privacy constraints , 2016, Inf. Sci..
[15] Anderson C. A. Nascimento,et al. Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols , 2015, ProvSec.
[16] Vinod Vaikuntanathan,et al. SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers , 2015, IEEE Transactions on Computers.
[17] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[18] Louis J. M. Aslett,et al. Encrypted statistical machine learning: new privacy preserving methods , 2015, ArXiv.
[19] Sander Siim,et al. Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations , 2015, Financial Cryptography Workshops.
[20] Muttukrishnan Rajarajan,et al. Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud , 2014, IEEE Transactions on Dependable and Secure Computing.
[21] Basit Shafiq,et al. A Random Decision Tree Framework for Privacy-Preserving Data Mining , 2014, IEEE Transactions on Dependable and Secure Computing.
[22] Wei Jiang,et al. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data , 2014, IEEE Transactions on Knowledge and Data Engineering.
[23] Basit Shafiq,et al. Differentially Private Naive Bayes Classification , 2013, 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT).
[24] Liang Tang,et al. Identifying missed monitoring alerts based on unstructured incident tickets , 2013, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).
[25] Liang Tang,et al. An integrated framework for optimizing automatic monitoring systems in large IT infrastructures , 2013, KDD.
[26] Wei Jiang,et al. Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.
[27] Vladimir Kolesnikov,et al. On the limits of privacy provided by order-preserving encryption , 2012, Bell Labs Technical Journal.
[28] A. Mechelli,et al. Using Support Vector Machine to identify imaging biomarkers of neurological and psychiatric disease: A critical review , 2012, Neuroscience & Biobehavioral Reviews.
[29] Stefan Bauer,et al. Fully Automatic Segmentation of Brain Tumor Images Using Support Vector Machine Classification in Combination with Hierarchical Conditional Random Field Regularization , 2011, MICCAI.
[30] John A. W. McCall,et al. Privacy-preserving approach to bayesian network structure learning from distributed data , 2011, GECCO.
[31] Ming-Syan Chen,et al. Privacy-preserving outsourcing support vector machines with random transformation , 2010, KDD.
[32] Ahmad-Reza Sadeghi,et al. Efficient privacy-preserving classification of ECG signals , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[33] Ahmad-Reza Sadeghi,et al. Secure Evaluation of Private Linear Branching Programs with Medical Applications , 2009, ESORICS.
[34] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[35] Vitaly Shmatikov,et al. Privacy-Preserving Classifier Learning , 2009, Financial Cryptography.
[36] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[37] Chris Clifton,et al. Privacy-preserving Naïve Bayes classification , 2008, The VLDB Journal.
[38] Yi-Ping Phoebe Chen,et al. Kernel-based naive bayes classifier for breast cancer prediction , 2007 .
[39] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[40] Jaideep Vaidya,et al. Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data , 2006, SAC.
[41] Jaideep Vaidya,et al. Privacy-Preserving SVM Classification on Vertically Partitioned Data , 2006, PAKDD.
[42] Rebecca N. Wright,et al. Privacy-preserving Bayesian network structure computation on distributed heterogeneous data , 2004, KDD.
[43] Alex Pentland,et al. Bayesian face recognition , 2000, Pattern Recognit..
[44] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[45] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[46] Susan T. Dumais,et al. A Bayesian Approach to Filtering Junk E-Mail , 1998, AAAI 1998.
[47] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[48] R. Fisher. THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .
[49] Robert H. Deng,et al. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers , 2018, IEEE Transactions on Dependable and Secure Computing.
[50] David Pointcheval,et al. Reading in the Dark: Classifying Encrypted Digits with Functional Encryption , 2018, IACR Cryptol. ePrint Arch..
[51] Debdeep Mukhopadhyay,et al. Efficient Secure k-Nearest Neighbours over Encrypted Data , 2018, EDBT.
[52] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[53] Muttukrishnan Rajarajan,et al. Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification , 2014, IEEE Journal of Biomedical and Health Informatics.
[54] Christoph Böhm,et al. The Basic Applications , 2013 .
[55] Jaideep Vaidya,et al. Knowledge and Information Systems , 2007 .
[56] Tommy Färnqvist. Number Theory Meets Cache Locality – Efficient Implementation of a Small Prime FFT for the GNU Multiple Precision Arithmetic Library , 2005 .
[57] Jaideep Vaidya,et al. Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data , 2003 .
[58] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[59] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[60] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.