-
1
-
-
85024479543
-
-
Arcene data set. Accessed: 2016-07-14
-
Arcene data set. https://archive. ics. uci. edu/ml/datasets/Arcene. Accessed: 2016-07-14.
-
-
-
-
2
-
-
84904805363
-
-
Eigen library. http://eigen. Tuxfamily. org/.
-
Eigen Library
-
-
-
3
-
-
85024488942
-
-
EMP toolkit. https://github. com/emp-toolkit.
-
EMP Toolkit
-
-
-
4
-
-
85024487436
-
-
Gisette data set. Accessed: 2016-07-14
-
Gisette data set. https://archive. ics. uci. edu/ml/datasets/Gisette. Accessed: 2016-07-14.
-
-
-
-
5
-
-
84884170176
-
-
GMP library. https://gmplib. org/.
-
GMP Library
-
-
-
6
-
-
85024497145
-
-
MNIST database. Accessed: 2016-07-14
-
MNIST database. http://yann. lecun. com/exdb/mnist/. Accessed: 2016-07-14.
-
-
-
-
7
-
-
84871630757
-
-
NTL library. http://www. shoup. net/ntl/.
-
NTL Library
-
-
-
8
-
-
85024478969
-
-
Tensorflow. https://www. Tensorflow. org/.
-
-
-
-
9
-
-
84995527907
-
Deep learning with differential privacy
-
ABADI, M., CHU, A., GOODFELLOW, I., MCMAHAN, H. B., MIRONOV, I., TALWAR, K., AND ZHANG, L. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016), ACM, pp. 308-318.
-
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016), ACM
, pp. 308-318
-
-
Abadi, M.1
Chu, A.2
Goodfellow, I.3
McMahan, H.B.4
Mironov, I.5
Talwar, K.6
Zhang, L.7
-
10
-
-
84964897439
-
Scalable and secure logistic regression via homomorphic encryption
-
AONO, Y., HAYASHI, T., TRIEU PHONG, L., AND WANG, L. Scalable and secure logistic regression via homomorphic encryption. In Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy (2016), ACM, pp. 142-144.
-
Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy (2016), ACM
, pp. 142-144
-
-
Aono, Y.1
Hayashi, T.2
Trieu Phong, L.3
Wang, L.4
-
11
-
-
84889059259
-
More efficient oblivious transfer and extensions for faster secure computation
-
ASHAROV, G., LINDELL, Y., SCHNEIDER, T., AND ZOHNER, M. More efficient oblivious transfer and extensions for faster secure computation. In Proceedings of the ACM CCS 2013 (2013).
-
(2013)
Proceedings of the ACM CCS 2013
-
-
Asharov, G.1
Lindell, Y.2
Schneider, T.3
Zohner, M.4
-
12
-
-
84881232126
-
Efficient garbling from a fixed-key blockcipher
-
BELLARE, M., HOANG, V. T., KEELVEEDHI, S., AND ROGAWAY, P. Efficient garbling from a fixed-key blockcipher. In Security and Privacy (SP), 2013 IEEE Symposium on (2013), IEEE, pp. 478-492.
-
Security and Privacy (SP), 2013 IEEE Symposium on (2013), IEEE
, pp. 478-492
-
-
Bellare, M.1
Hoang, V.T.2
Keelveedhi, S.3
Rogaway, P.4
-
13
-
-
84869382999
-
Foundations of garbled circuits
-
BELLARE, M., HOANG, V. T., AND ROGAWAY, P. Foundations of garbled circuits. In Proceedings of the 2012 ACM conference on Computer and communications security (2012), ACM, pp. 784-796.
-
Proceedings of the 2012 ACM Conference on Computer and Communications Security (2012), ACM
, pp. 784-796
-
-
Bellare, M.1
Hoang, V.T.2
Rogaway, P.3
-
17
-
-
70449575839
-
Homomorphic encryption and secure comparison
-
DAMGARD, I., GEISLER, M., AND KROIGARD, M. Homomorphic encryption and secure comparison. International Journal of Applied Cryptography 1, 1 (2008), 22-31.
-
(2008)
International Journal of Applied Cryptography 1, 1
, pp. 22-31
-
-
Damgard, I.1
Geisler, M.2
Kroigard, M.3
-
18
-
-
84952676753
-
Aby-a framework for efficient mixed-protocol secure two-party computation
-
DEMMLER, D., SCHNEIDER, T., AND ZOHNER, M. Aby-a framework for efficient mixed-protocol secure two-party computation. In NDSS (2015).
-
(2015)
NDSS
-
-
Demmler, D.1
Schneider, T.2
Zohner, M.3
-
19
-
-
0034820931
-
Privacy-preserving cooperative scientific computations
-
Citeseer
-
DU, W., AND ATALLAH, M. J. Privacy-preserving cooperative scientific computations. In csfw (2001), vol. 1, Citeseer, p. 273.
-
(2001)
Csfw
, vol.1
, pp. 273
-
-
Du, W.D.1
Atallah, M.J.2
-
20
-
-
2942529194
-
Privacy-preserving multivariate statistical analysis: Linear regression and classification
-
SIAM
-
DU, W., HAN, Y. S., AND CHEN, S. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In SDM (2004), vol. 4, SIAM, pp. 222-233.
-
(2004)
SDM
, vol.4
, pp. 222-233
-
-
Dui, W.D.1
Han, Y.S.2
Chen, S.3
-
21
-
-
85024474813
-
-
GASCON, A., SCHOPPMANN, P., BALLE, B., RAYKOVA, M., DOERNER, J., ZAHUR, S., AND EVANS, D. Secure linear regression on vertically partitioned datasets.
-
Secure Linear Regression on Vertically Partitioned Datasets
-
-
Gascon, A.1
Schoppmann, P.2
Balle, B.3
Raykova, M.4
Doerner, J.5
Zahur, S.6
Evans, D.7
-
22
-
-
84997765950
-
Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy
-
GILAD-BACHRACH, R., DOWLIN, N., LAINE, K., LAUTER, K., NAEHRIG, M., AND WERNSING, J. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In Proceedings of The 33rd International Conference on Machine Learning (2016), pp. 201-210.
-
(2016)
Proceedings of the 33rd International Conference on Machine Learning
, pp. 201-210
-
-
Gilad-Bachrach, R.1
Dowlin, N.2
Laine, K.3
Lauter, K.4
Naehrig, M.5
Wernsing, J.6
-
23
-
-
85024494654
-
Secure data exchange: A marketplace in the cloud
-
GILAD-BACHRACH, R., LAINE, K., LAUTER, K., RINDAL, P., AND ROSULEK, M. Secure data exchange: A marketplace in the cloud. Cryptology ePrint Archive, Report 2016/620, 2016. http://eprint. iacr. org/ 2016/620.
-
(2016)
Cryptology EPrint Archive, Report 2016/620
-
-
Gilad-Bachrach, R.1
Laine, K.2
Lauter, K.3
Rindal, P.4
Rosulek, M.5
-
24
-
-
85024480388
-
-
GILAD-BACHRACH, R., LAINE, K., LAUTER, K., RINDAL, P., AND ROSULEK, M. Secure data exchange: A marketplace in the cloud.
-
Secure Data Exchange: A Marketplace in the Cloud
-
-
Gilad-Bachrach, R.1
Laine, K.2
Lauter, K.3
Rindal, P.4
Rosulek, M.5
-
25
-
-
33646391384
-
Result analysis of the nips 2003 feature selection challenge
-
GUYON, I., GUNN, S., BEN-HUR, A., AND DROR, G. Result analysis of the nips 2003 feature selection challenge. In Advances in neural information processing systems (2004), pp. 545-552.
-
(2004)
Advances in Neural Information Processing Systems
, pp. 545-552
-
-
Guyon, I.1
Gunn, S.2
Ben-Hur, A.3
Dror, G.4
-
26
-
-
84863165439
-
-
HASTIE, T., TIBSHIRANI, R., AND FRIEDMAN, J. The elements of statistical learning-data mining, inference, and prediction.
-
The Elements of Statistical Learning-data Mining, Inference, and Prediction
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
27
-
-
24144457853
-
Extending oblivious transfers efficiently
-
ISHAI, Y., KILIAN, J., NISSIM, K., AND PETRANK, E. Extending oblivious transfers efficiently. Advances in Cryptology-CRYPTO 2003 (2003), 145-161.
-
(2003)
Advances in Cryptology-CRYPTO 2003
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
29
-
-
84856450939
-
Outsourcing multiparty computation
-
KAMARA, S., MOHASSEL, P., AND RAYKOVA, M. Outsourcing multiparty computation. IACR Cryptology ePrint Archive (2011), 272.
-
(2011)
IACR Cryptology EPrint Archive
, pp. 272
-
-
Kamara, S.1
Mohassel, P.2
Raykova, M.3
-
30
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
Springer
-
KOLESNIKOV, V., AND SCHNEIDER, T. Improved garbled circuit: Free xor gates and applications. In International Colloquium on Automata, Languages, and Programming (2008), Springer, pp. 486-498.
-
(2008)
International Colloquium on Automata, Languages, and Programming
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
32
-
-
64249101946
-
A proof of security of yaos protocol for two-party computation
-
LINDELL, Y., AND PINKAS, B. A proof of security of yaos protocol for two-party computation. Journal of Cryptology 22, 2 (2009), 161-188.
-
(2009)
Journal of Cryptology
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
33
-
-
84937952927
-
On the computational efficiency of training neural networks
-
LIVNI, R., SHALEV-SHWARTZ, S., AND SHAMIR, O. On the computational efficiency of training neural networks. In Advances in Neural Information Processing Systems (2014), pp. 855-863.
-
(2014)
Advances in Neural Information Processing Systems
, pp. 855-863
-
-
Livni, R.1
Shalev-Shwartz, S.2
Shamir, O.3
-
34
-
-
26444561723
-
-
MALKHI, D., NISAN, N., PINKAS, B., SELLA, Y., et al. Fairplaysecure two-party computation system.
-
Fairplaysecure Two-party Computation System
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
35
-
-
84945191638
-
Graphsc: Parallel secure computation made easy
-
IEEE
-
NAYAK, K., WANG, X. S., IOANNIDIS, S., WEINSBERG, U., TAFT, N., AND SHI, E. Graphsc: Parallel secure computation made easy. In 2015 IEEE Symposium on Security and Privacy (2015), IEEE, pp. 377-394.
-
(2015)
2015 IEEE Symposium on Security and Privacy
, pp. 377-394
-
-
Nayak, K.1
Wang, X.S.2
Ioannidis, S.3
Weinsberg, U.4
Taft, N.5
Shi, E.6
-
36
-
-
84888987660
-
Privacy-preserving matrix factorization
-
ACM
-
NIKOLAENKO, V., IOANNIDIS, S., WEINSBERG, U., JOYE, M., TAFT, N., AND BONEH, D. Privacy-preserving matrix factorization. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (2013), ACM, pp. 801-812.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 801-812
-
-
Nikolaenko, V.1
Ioannidis, S.2
Weinsberg, U.3
Joye, M.4
Taft, N.5
Boneh, D.6
-
37
-
-
84881255209
-
Privacy-preserving ridge regression on hundreds of millions of records
-
IEEE
-
NIKOLAENKO, V., WEINSBERG, U., IOANNIDIS, S., JOYE, M., BONEH, D., AND TAFT, N. Privacy-preserving ridge regression on hundreds of millions of records. In Security and Privacy (SP), 2013 IEEE Symposium on (2013), IEEE, pp. 334-348.
-
(2013)
Security and Privacy (SP), 2013 IEEE Symposium on
, pp. 334-348
-
-
Nikolaenko, V.1
Weinsberg, U.2
Ioannidis, S.3
Joye, M.4
Boneh, D.5
Taft, N.6
-
39
-
-
51849126892
-
A framework for efficient and composable oblivious transfer
-
PEIKERT, C., VAIKUNTANATHAN, V., AND WATERS, B. A framework for efficient and composable oblivious transfer. Advances in Cryptology-CRYPTO 2008 (2008), 554-571.
-
(2008)
Advances in Cryptology-CRYPTO 2008
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
-
40
-
-
12244286332
-
Privacy preserving regression modelling via distributed computation
-
ACM
-
SANIL, A. P., KARR, A. F., LIN, X., AND REITER, J. P. Privacy preserving regression modelling via distributed computation. In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining (2004), ACM, pp. 677-682.
-
(2004)
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 677-682
-
-
Sanil, A.P.1
Karr, A.F.2
Lin, X.3
Reiter, J.P.4
-
42
-
-
49549109804
-
Secure logistic regression of horizontally and vertically partitioned distributed databases
-
IEEE
-
SLAVKOVIC, A. B., NARDI, Y., AND TIBBITS, M. M. " secure" logistic regression of horizontally and vertically partitioned distributed databases. In Seventh IEEE International Conference on Data Mining Workshops (ICDMW 2007) (2007), IEEE, pp. 723-728.
-
(2007)
Seventh IEEE International Conference on Data Mining Workshops (ICDMW 2007)
, pp. 723-728
-
-
Slavkovic, A.B.1
Nardi, Y.2
Tibbits, M.M.3
-
43
-
-
84897680504
-
Stochastic gradient descent with differentially private updates
-
IEEE
-
SONG, S., CHAUDHURI, K., AND SARWATE, A. D. Stochastic gradient descent with differentially private updates. In Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE (2013), IEEE, pp. 245-248.
-
(2013)
Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE
, pp. 245-248
-
-
Song, S.1
Chaudhuri, K.2
Sarwate, A.D.3
-
44
-
-
38649100979
-
Privacy-preserving SVM classification
-
VAIDYA, J., YU, H., AND JIANG, X. Privacy-preserving svm classification. Knowledge and Information Systems 14, 2 (2008), 161-178.
-
(2008)
Knowledge and Information Systems
, vol.14
, Issue.2
, pp. 161-178
-
-
Vaidya, J.1
Jiang, X.2
-
45
-
-
85024478287
-
Faster two-party computation secure against malicious adversaries in the single-execution setting
-
WANG, X., MALOZEMOFF, A. J., AND KATZ, J. Faster two-party computation secure against malicious adversaries in the single-execution setting. Cryptology ePrint Archive, Report 2016/762, 2016. http://eprint. iacr. org/2016/762.
-
(2016)
Cryptology EPrint Archive, Report 2016/762
-
-
Wang, X.1
Malozemoff, A.J.2
Katz, J.3
-
46
-
-
84983047430
-
Privacy-preservation for stochastic gradient descent application to secure logistic regression
-
WU, S., TERUYA, T., KAWAMOTO, J., SAKUMA, J., AND KIKUCHI, H. Privacy-preservation for stochastic gradient descent application to secure logistic regression. The 27th Annual Conference of the Japanese Society for Artificial Intelligence 27 (2013), 1-4.
-
(2013)
The 27th Annual Conference of the Japanese Society for Artificial Intelligence
, vol.27
, pp. 1-4
-
-
Teruya, T.1
Kawamoto, J.2
Sakuma, J.3
Kikuchi, H.4
-
48
-
-
33745799070
-
Privacy-preserving SVM classification on vertically partitioned data
-
Springer
-
YU, H., VAIDYA, J., AND JIANG, X. Privacy-preserving svm classification on vertically partitioned data. In Pacific-Asia Conference on Knowledge Discovery and Data Mining (2006), Springer, pp. 647-656.
-
(2006)
Pacific-Asia Conference on Knowledge Discovery and Data Mining
, pp. 647-656
-
-
Vaidya, J.1
Jiang, X.2
|