Outsourced privacy-preserving classification service over encrypted data
暂无分享,去创建一个
Tong Li | Zheli Liu | Chunfu Jia | Ping Li | Zhengan Huang | Zheli Liu | Chunfu Jia | Zhengan Huang | Ping Li | Tong Li
[1] Shai Avidan,et al. Blind Vision , 2006, ECCV.
[2] Sheng Zhong,et al. Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data , 2011, Neural Computing and Applications.
[3] Shai Avidan,et al. Efficient Methods for Privacy Preserving Face Detection , 2006, NIPS.
[4] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[5] Ali Miri,et al. Privacy-preserving back-propagation and extreme learning machine algorithms , 2012, Data Knowl. Eng..
[6] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[7] Ahmad-Reza Sadeghi,et al. Privacy-Preserving ECG Classification With Branching Programs and Neural Networks , 2011, IEEE Transactions on Information Forensics and Security.
[8] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[9] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[10] Siu-Ming Yiu,et al. Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..
[11] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[12] Taneli Mielikäinen,et al. Cryptographically private support vector machines , 2006, KDD '06.
[13] Nasser M. Nasrabadi,et al. Pattern Recognition and Machine Learning , 2006, Technometrics.
[14] Michael Naehrig,et al. ML Confidential: Machine Learning on Encrypted Data , 2012, ICISC.
[15] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[16] Michael Naehrig,et al. Private Predictive Analysis on Encrypted Medical Data , 2014, IACR Cryptol. ePrint Arch..
[17] Shucheng Yu,et al. Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[18] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[19] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[20] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[21] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[22] Jonathan Katz,et al. Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose , 2013, CRYPTO.
[23] Rebecca N. Wright,et al. Privacy-preserving distributed k-means clustering over arbitrarily partitioned data , 2005, KDD '05.
[24] Jin Li,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.
[25] Yehuda Lindell. Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries , 2015, Journal of Cryptology.
[26] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[27] Keke Chen,et al. Privacy preserving data classification with rotation perturbation , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[28] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.
[29] Ahmad-Reza Sadeghi,et al. Secure Evaluation of Private Linear Branching Programs with Medical Applications , 2009, ESORICS.
[30] Sebastian Nowozin,et al. Oblivious Multi-Party Machine Learning on Trusted Processors , 2016, USENIX Security Symposium.
[31] Sheng Zhong,et al. Privacy-Preserving Backpropagation Neural Network Learning , 2009, IEEE Transactions on Neural Networks.
[32] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[33] Chris Clifton,et al. Privacy-preserving Naïve Bayes classification , 2008, The VLDB Journal.
[34] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[35] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.