메뉴 건너뛰기




Volumn 79-80, Issue , 2012, Pages 40-61

Privacy-preserving back-propagation and extreme learning machine algorithms

Author keywords

Back propagation; Distributed data structures; Extreme learning machine; Machine learning; Neural networks; Privacy preserving data mining

Indexed keywords

ACTIVATION FUNCTIONS; BATCH LEARNING; BP ALGORITHM; COMPLEX DATA; CONTINUOUS DATA; DISTRIBUTED DATA STRUCTURES; EXTREME LEARNING MACHINE; INPUT DATAS; LEARNING MODELS; LEARNING PHASE; LEARNING TECHNIQUES; MULTILAYER MODELS; NEURAL NETWORK LEARNING; NEURAL NETWORK SYSTEMS; NEW PROTOCOL; PRIVACY PRESERVING; PRIVACY PRESERVING DATA MINING; PRIVACY-PRESERVING PROTOCOLS; SENSITIVE DATAS; SINGLE LAYER; SINGLE-LAYER MODELS;

EID: 84865103996     PISSN: 0169023X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.datak.2012.06.001     Document Type: Article
Times cited : (54)

References (62)
  • 1
    • 39749164736 scopus 로고    scopus 로고
    • Recent advances in preserving privacy when mining data
    • F. Bonchi, B. Malin, and Y. Saygin Recent advances in preserving privacy when mining data Data & Knowledge Engineering 65 1 2008 1 4
    • (2008) Data & Knowledge Engineering , vol.65 , Issue.1 , pp. 1-4
    • Bonchi, F.1    Malin, B.2    Saygin, Y.3
  • 6
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • M. Kantarcioglu, and C. Clifton Privacy-preserving distributed mining of association rules on horizontally partitioned data IEEE Transactions on Knowledge and Data Engineering 16 9 2004 1026 1037
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 9
    • 50049100629 scopus 로고    scopus 로고
    • Data privacy protection in multi-party clustering
    • W. Yang, and S. Huang Data privacy protection in multi-party clustering Data & Knowledge Engineering 67 1 2008 185 199
    • (2008) Data & Knowledge Engineering , vol.67 , Issue.1 , pp. 185-199
    • Yang, W.1    Huang, S.2
  • 11
  • 14
    • 71749085624 scopus 로고    scopus 로고
    • Formal anonymity models for efficient privacy-preserving joins
    • M. Kantarcioglu, A. Inan, W. Jiang, and B. Malin Formal anonymity models for efficient privacy-preserving joins Data & Knowledge Engineering 68 11 2009 1206 1223
    • (2009) Data & Knowledge Engineering , vol.68 , Issue.11 , pp. 1206-1223
    • Kantarcioglu, M.1    Inan, A.2    Jiang, W.3    Malin, B.4
  • 19
    • 39749182452 scopus 로고    scopus 로고
    • The applicability of the perturbation based privacy preserving data mining for real-world data
    • L. Liu, M. Kantarcioglu, and B. Thuraisingham The applicability of the perturbation based privacy preserving data mining for real-world data Data & Knowledge Engineering 65 1 2008 5 21
    • (2008) Data & Knowledge Engineering , vol.65 , Issue.1 , pp. 5-21
    • Liu, L.1    Kantarcioglu, M.2    Thuraisingham, B.3
  • 20
    • 55149108163 scopus 로고    scopus 로고
    • Multiplicative noise for masking continuous data
    • Statistical Research Division, U.S. Bureau of the Census Washington DC, USA
    • J.J. Kim, and W.E. Winkler Multiplicative noise for masking continuous data Research Report Series (Statistics #2003-01) April 2003 Statistical Research Division, U.S. Bureau of the Census Washington DC, USA
    • (2003) Research Report Series (Statistics #2003-01)
    • Kim, J.J.1    Winkler, W.E.2
  • 22
    • 41549109791 scopus 로고    scopus 로고
    • On static and dynamic methods for condensation-based privacy-preserving data mining
    • C.C. Aggarwal, and P.S. Yu On static and dynamic methods for condensation-based privacy-preserving data mining ACM Transactions on Database Systems (TODS) 33 1 2008 2:1 2:39
    • (2008) ACM Transactions on Database Systems (TODS) , vol.33 , Issue.1 , pp. 21-239
    • Aggarwal, C.C.1    Yu, P.S.2
  • 23
    • 33745903481 scopus 로고    scopus 로고
    • Extreme learning machine: Theory and applications
    • G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew Extreme learning machine: theory and applications Neurocomputing 70 1-3 2006 489 501 (selected Papers from the 7th Brazilian Symposium on Neural Networks (SBRN04))
    • (2006) Neurocomputing , vol.70 , Issue.13 , pp. 489-501
    • Huang, G.-B.1    Zhu, Q.-Y.2    Siew, C.-K.3
  • 36
    • 70350460233 scopus 로고    scopus 로고
    • A privacy preserving neural network learning algorithm for horizontally partitioned databases
    • L. Guang, W. Ya-Dong, and S. Xiao-Hong A privacy preserving neural network learning algorithm for horizontally partitioned databases Information Technology Journal 9 1 2009 1 10
    • (2009) Information Technology Journal , vol.9 , Issue.1 , pp. 1-10
    • Guang, L.1    Ya-Dong, W.2    Xiao-Hong, S.3
  • 39
    • 70350345197 scopus 로고    scopus 로고
    • Privacy-preserving back propagation neural network learning
    • T. Chen, and S. Zhong Privacy-preserving back propagation neural network learning IEEE Transactions on Neural Networks 20 10 2009 1554 1564
    • (2009) IEEE Transactions on Neural Networks , vol.20 , Issue.10 , pp. 1554-1564
    • Chen, T.1    Zhong, S.2
  • 40
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Springer-Verlag New York, Inc. New York, NY, USA
    • T. ElGamal A public key cryptosystem and a signature scheme based on discrete logarithms Proceedings of CRYPTO 84 on Advances in cryptology 1985 Springer-Verlag New York, Inc. New York, NY, USA 10 18
    • (1985) Proceedings of CRYPTO 84 on Advances in Cryptology , pp. 10-18
    • Elgamal, T.1
  • 41
    • 79251640709 scopus 로고    scopus 로고
    • Privacy preserving back-propagation neural network learning over arbitrarily partitioned data
    • A. Bansal, T. Chen, and S. Zhong Privacy preserving back-propagation neural network learning over arbitrarily partitioned data Neural Computing and Applications 20 2011 143 150
    • (2011) Neural Computing and Applications , vol.20 , pp. 143-150
    • Bansal, A.1    Chen, T.2    Zhong, S.3
  • 42
    • 23844556499 scopus 로고    scopus 로고
    • Oblivious polynomial evaluation and oblivious neural learning
    • Y.-C. Chang, and C.-J. Lu Oblivious polynomial evaluation and oblivious neural learning Theoretical Computer Science 341 2005 39 54
    • (2005) Theoretical Computer Science , vol.341 , pp. 39-54
    • Chang, Y.-C.1    Lu, C.-J.2
  • 47
    • 0003538319 scopus 로고
    • Plenum Press New York, London
    • J. Ortega Matrix Theory 1987 Plenum Press New York, London
    • (1987) Matrix Theory
    • Ortega, J.1
  • 50
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of cryptography
    • Cambridge University Press New York, NY, USA
    • O. Goldreich Foundations of cryptography Basic Applications vol. 2 2004 Cambridge University Press New York, NY, USA
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 51
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali, and C. Rackoff The knowledge complexity of interactive proof systems SIAM Journal on Computing 18 1 1989 186 208
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 52
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti Security and composition of multiparty cryptographic protocols Journal of Cryptology 13 1 2000 143 202
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 56
    • 0001006209 scopus 로고
    • Local computations with probabilities on graphical structures and their application to expert systems
    • S.L. Lauritzen, and D.J. Spiegelhalter Local computations with probabilities on graphical structures and their application to expert systems Journal of the Royal Statistical Society B 50 1988 157 194
    • (1988) Journal of the Royal Statistical Society B , vol.50 , pp. 157-194
    • Lauritzen, S.L.1    Spiegelhalter, D.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.