Privacy-Preserving Collaborative Deep Learning with Application to Human Activity Recognition
暂无分享,去创建一个
Marimuthu Palaniswami | Lingjuan Lyu | Yee Wei Law | Xuanli He | M. Palaniswami | Lingjuan Lyu | Xuanli He
[1] Tarek F. Abdelzaher,et al. PoolView: stream privacy for grassroots participatory sensing , 2008, SenSys '08.
[2] Héctor Pomares,et al. mHealthDroid: A Novel Framework for Agile Development of Mobile Health Applications , 2014, IWAAL.
[3] Kanishka Bhaduri,et al. Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[4] GangopadhyayAryya,et al. A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms , 2006, VLDB 2006.
[5] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[6] Phil Blunsom,et al. A Convolutional Neural Network for Modelling Sentences , 2014, ACL.
[7] Marimuthu Palaniswami,et al. An improved scheme for privacy-preserving collaborative anomaly detection , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[8] Marimuthu Palaniswami,et al. Privacy-Preserving Collaborative Anomaly Detection for Participatory Sensing , 2014, PAKDD.
[9] Thomas Plötz,et al. Deep, Convolutional, and Recurrent Models for Human Activity Recognition Using Wearables , 2016, IJCAI.
[10] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[11] Keke Chen,et al. Privacy preserving data classification with rotation perturbation , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[12] Kun Liu,et al. A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods , 2008, Privacy-Preserving Data Mining.
[13] Kun Liu,et al. An Attacker's View of Distance Preserving Maps for Privacy Preserving Data Mining , 2006, PKDD.
[14] Hong Shen,et al. Effective Reconstruction of Data Perturbed by Random Projections , 2012, IEEE Transactions on Computers.
[15] Michael J. McGrath,et al. Sensor Technologies: Healthcare, Wellness and Environmental Applications , 2013 .
[16] Hui Ding,et al. Querying and mining of time series data: experimental comparison of representations and distance measures , 2008, Proc. VLDB Endow..
[17] Yoshua Bengio,et al. Convolutional networks for images, speech, and time series , 1998 .
[18] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[19] Elaine Shi,et al. Privacy-Preserving Aggregation of Time-Series Data , 2011, NDSS.
[20] Michael Beigl,et al. Towards Collaborative Group Activity Recognition Using Mobile Devices , 2013, Mob. Networks Appl..
[21] Wenliang Du,et al. Deriving private information from randomized data , 2005, SIGMOD '05.
[22] Olvi L. Mangasarian,et al. Privacy-Preserving Classification of Horizontally Partitioned Data via Random Kernels , 2008, DMIN.
[23] S. Nelson,et al. Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays , 2008, PLoS genetics.
[24] Aryya Gangopadhyay,et al. A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms , 2006, The VLDB Journal.
[25] Fan Zhang,et al. Data perturbation with state-dependent noise for participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.
[26] Davide Anguita,et al. A Public Domain Dataset for Human Activity Recognition using Smartphones , 2013, ESANN.
[27] Ivan Damgård,et al. Secure Multiparty Computation and Secret Sharing , 2015 .
[28] Daniel Roggen,et al. Deep Convolutional and LSTM Recurrent Neural Networks for Multimodal Wearable Activity Recognition , 2016, Sensors.
[29] Heikki Mannila,et al. Random projection in dimensionality reduction: applications to image and text data , 2001, KDD '01.
[30] Claude Castelluccia,et al. I Have a DREAM! (DiffeRentially privatE smArt Metering) , 2011, Information Hiding.
[31] KarguptaHillol,et al. Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining , 2006 .
[32] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[33] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.