Outsourced Privacy Preserving SVM with Multiple Keys
暂无分享,去创建一个
P. Zhang | S. Yiu | Jun Zhang | Xuan Wang | Hainan Zhao | Z. L. Jiang | Yulin Wu | Wenli Sun
[1] Guoping He,et al. Privacy-preserving SVM classification on arbitrarily partitioned data , 2010, 2010 IEEE International Conference on Progress in Informatics and Computing.
[2] Jaideep Vaidya,et al. Knowledge and Information Systems , 2007 .
[3] Stefan Katzenbeisser,et al. Efficiently Outsourcing Multiparty Computation Under Multiple Keys , 2013, IEEE Transactions on Information Forensics and Security.
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Laurence T. Yang,et al. Privacy Preserving Deep Computation Model on Cloud for Big Data Feature Learning , 2016, IEEE Transactions on Computers.
[6] Siu-Ming Yiu,et al. Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..
[7] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.
[8] Ximeng Liu,et al. An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.
[9] Chen Li,et al. Comments on “An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys” , 2018, IEEE Transactions on Information Forensics and Security.
[10] Wei Zhang,et al. Encrypted SVM for Outsourced Data Mining , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[11] Zoe L. Jiang,et al. Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM , 2017, SCC@AsiaCCS.
[12] Emmanuel Bresson,et al. A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications , 2003, ASIACRYPT.
[13] Jaideep Vaidya,et al. Privacy-Preserving SVM Classification on Vertically Partitioned Data , 2006, PAKDD.
[14] Jaideep Vaidya,et al. Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data , 2006, SAC.
[15] Zoe L. Jiang,et al. Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).
[16] Siu-Ming Yiu,et al. Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery , 2017, DBSec.
[17] Donald Ervin Knuth,et al. The Art of Computer Programming, Volume II: Seminumerical Algorithms , 1970 .