메뉴 건너뛰기




Volumn 10493 LNCS, Issue , 2017, Pages 494-512

Privacy-preserving decision trees evaluation via linear functions

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; CLASSIFICATION (OF INFORMATION); COMPUTER AIDED DIAGNOSIS; DATA PRIVACY; FACE RECOGNITION; LEARNING ALGORITHMS; LEARNING SYSTEMS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 85029534077     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-66399-9_27     Document Type: Conference Paper
Times cited : (92)

References (35)
  • 1
    • 70350399649 scopus 로고    scopus 로고
    • Secure evaluation of private linear branching programs with medical applications
    • Backes, M., Ning, P. (eds.), Springer, Heidelberg
    • Barni, M., Failla, P., Kolesnikov, V., Lazzeretti, R., Sadeghi, A.-R., Schneider, T.: Secure evaluation of private linear branching programs with medical applications. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 424–439. Springer, Heidelberg (2009). doi:10.1007/978-3-642-04444-1 26
    • (2009) ESORICS 2009. LNCS , vol.5789 , pp. 424-439
    • Barni, M.1    Failla, P.2    Kolesnikov, V.3    Lazzeretti, R.4    Sadeghi, A.-R.5    Schneider, T.6
  • 2
  • 3
    • 84905174579 scopus 로고    scopus 로고
    • Private predictive analysis on encrypted medical data
    • Bos, J.W., Lauter, K.E., Naehrig, M.: Private predictive analysis on encrypted medical data. J. Biomed. Inform. 50, 234–243 (2014)
    • (2014) J. Biomed. Inform. , vol.50 , pp. 234-243
    • Bos, J.W.1    Lauter, K.E.2    Naehrig, M.3
  • 4
    • 85098887199 scopus 로고    scopus 로고
    • Machine learning classification over encrypted data
    • Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. In: NDSS (2015)
    • (2015) NDSS
    • Bost, R.1    Popa, R.A.2    Tu, S.3    Goldwasser, S.4
  • 7
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Brickell, E.F. (ed.), Springer, Heidelberg
    • Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89–105. Springer, Heidelberg (1993). doi:10.1007/3-540-48071-4 7
    • (1993) CRYPTO 1992. LNCS , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 8
    • 85092033531 scopus 로고    scopus 로고
    • ABY - a framework for efficient mixed-protocol secure two-party computation
    • Demmler, D., Schneider, T., Zohner, M.: ABY - a framework for efficient mixed-protocol secure two-party computation. In: NDSS (2015)
    • (2015) NDSS
    • Demmler, D.1    Schneider, T.2    Zohner, M.3
  • 9
    • 33645584057 scopus 로고    scopus 로고
    • Privacy-preserving multivariate statistical analysis: Linear regression and classification
    • Du, W., Han, Y.S. Chen, S.: Privacy-preserving multivariate statistical analysis: linear regression and classification. In: SDM (2004)
    • (2004) SDM
    • Du, W.1    Han, Y.S.2    Chen, S.3
  • 10
    • 84954097669 scopus 로고    scopus 로고
    • Model inversion attacks that exploit confidence information and basic countermeasures
    • Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: ACM CCS (2015)
    • (2015) ACM CCS
    • Fredrikson, M.1    Jha, S.2    Ristenpart, T.3
  • 12
    • 85029535271 scopus 로고    scopus 로고
    • Practical private DNA string searching and matching through efficient oblivious automata evaluation
    • Frikken, K.B.: Practical private DNA string searching and matching through efficient oblivious automata evaluation. In: DBSec (2009)
    • (2009) Dbsec
    • Frikken, K.B.1
  • 13
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Blakley, G.R., Chaum, D. (eds.), Springer, Heidelberg
    • ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985). doi:10.1007/3-540-39568-7 2
    • (1985) CRYPTO 1984. LNCS , vol.196 , pp. 10-18
    • Elgamal, T.1
  • 14
    • 77649261628 scopus 로고    scopus 로고
    • A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University, Stanford, CA, USA
    • Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University, Stanford, CA, USA, AAI3382729 (2009)
    • (2009) AAI3382729
    • Gentry, C.1
  • 15
    • 84876012553 scopus 로고    scopus 로고
    • ML confidential: Machine learning on encrypted data
    • Kwon, T., Lee, M.-K., Kwon, D. (eds.), Springer, Heidelberg
    • Graepel, T., Lauter, K., Naehrig, M.: ML confidential: machine learning on encrypted data. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 1–21. Springer, Heidelberg (2013). doi:10.1007/978-3-642-37682-5 1
    • (2013) ICISC 2012. LNCS , vol.7839 , pp. 1-21
    • Graepel, T.1    Lauter, K.2    Naehrig, M.3
  • 17
    • 84888999950 scopus 로고    scopus 로고
    • Evaluating branching programs on encrypted data
    • Ishai, Y., Paskin, A.: Evaluating branching programs on encrypted data. In: TCC (2007)
    • (2007) TCC
    • Ishai, Y.1    Paskin, A.2
  • 18
    • 84864081607 scopus 로고    scopus 로고
    • A practical differentially private random decision tree classifier
    • Jagannathan, G., Pillaipakkamnatt, K., Wright, R.N.: A practical differentially private random decision tree classifier. Trans. Data Priv. 5(1), 273–295 (2012)
    • (2012) Trans. Data Priv , vol.5 , Issue.1 , pp. 273-295
    • Jagannathan, G.1    Pillaipakkamnatt, K.2    Wright, R.N.3
  • 19
    • 84905375066 scopus 로고    scopus 로고
    • FleXOR: Flexible garbling for XOR Gates that beats free-XOR
    • Garay, J.A., Gennaro, R. (eds.), Springer, Heidelberg
    • Kolesnikov, V., Mohassel, P., Rosulek, M.: FleXOR: flexible garbling for XOR Gates that beats free-XOR. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014 Part II. LNCS, vol. 8617, pp. 440–457. Springer, Heidelberg (2014). doi:10.1007/978-3-662-44381-1 25
    • (2014) CRYPTO 2014 Part II. LNCS , vol.8617 , pp. 440-457
    • Kolesnikov, V.1    Mohassel, P.2    Rosulek, M.3
  • 20
    • 49049099825 scopus 로고    scopus 로고
    • Improved garbled circuit: Free XOR gates and applications
    • Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.), Springer, Heidelberg
    • Kolesnikov, V., Schneider, T.: Improved garbled circuit: free XOR gates and applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008 Part II. LNCS, vol. 5126, pp. 486–498. Springer, Heidelberg (2008). doi:10.1007/978-3-540-70583-3 40
    • (2008) ICALP 2008 Part II. LNCS , vol.5126 , pp. 486-498
    • Kolesnikov, V.1    Schneider, T.2
  • 21
    • 0034922742 scopus 로고    scopus 로고
    • Machine learning for medical diagnosis: History, state of the art and perspective
    • Kononenko, I.: Machine learning for medical diagnosis: history, state of the art and perspective. Artif. Intell. Med. 23(1), 89–109 (2001)
    • (2001) Artif. Intell. Med. , vol.23 , Issue.1 , pp. 89-109
    • Kononenko, I.1
  • 22
    • 84886567160 scopus 로고    scopus 로고
    • School of Information and Computer Sciences, University of California, Irvine
    • Lichman, M.: UCI machine learning repository. School of Information and Computer Sciences, University of California, Irvine (2013). http://archive.ics.uci.edu/ml
    • (2013) UCI Machine Learning Repository
    • Lichman, M.1
  • 23
    • 84884490479 scopus 로고    scopus 로고
    • Fast cut-and-choose based protocols for malicious and covert adversaries
    • Canetti, R., Garay, J.A. (eds.), Springer, Heidelberg
    • Lindell, Y.: Fast cut-and-choose based protocols for malicious and covert adversaries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013 Part II. LNCS, vol. 8043, pp. 1–17. Springer, Heidelberg (2013). doi:10.1007/978-3-642-40084-1 1
    • (2013) CRYPTO 2013 Part II. LNCS , vol.8043 , pp. 1-17
    • Lindell, Y.1
  • 25
    • 84924224031 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. J. Cryptol. 28(2), 312–350 (2015)
    • (2015) J. Cryptol. , vol.28 , Issue.2 , pp. 312-350
    • Lindell, Y.1    Pinkas, B.2
  • 26
    • 84865821534 scopus 로고    scopus 로고
    • Oblivious decision programs from oblivious transfer: Efficient reductions
    • Keromytis, A.D. (ed.), Springer, Heidelberg
    • Mohassel, P., Niksefat, S.: Oblivious decision programs from oblivious transfer: efficient reductions. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 269– 284. Springer, Heidelberg (2012). doi:10.1007/978-3-642-32946-3 20
    • (2012) FC 2012. LNCS , vol.7397 , pp. 269-284
    • Mohassel, P.1    Niksefat, S.2
  • 27
    • 84857721473 scopus 로고    scopus 로고
    • An efficient protocol for oblivious DFA evaluation and applications
    • Dunkelman, O. (ed.), Springer, Heidelberg
    • Mohassel, P., Niksefat, S., Sadeghian, S., Sadeghiyan, B.: An efficient protocol for oblivious DFA evaluation and applications. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 398–415. Springer, Heidelberg (2012). doi:10.1007/978-3-642-27954-6 25
    • (2012) CT-RSA 2012. LNCS , vol.7178 , pp. 398-415
    • Mohassel, P.1    Niksefat, S.2    Sadeghian, S.3    Sadeghiyan, B.4
  • 29
    • 84913536910 scopus 로고    scopus 로고
    • Towards efficient privacy-preserving image feature extraction in cloud computing
    • Qin, Z., Yan, K. Ren, K., Chen, C.W., Wang, C.: Towards efficient privacy-preserving image feature extraction in cloud computing. In: ACM Multimedia (2014)
    • (2014) ACM Multimedia
    • Qin, Z.1    Yan, K.2    Ren, K.3    Chen, C.W.4    Wang, C.5
  • 30
    • 84878605211 scopus 로고    scopus 로고
    • Methods for restricting message space in public-key encryption
    • Sakai, Y., Emura, K., Hanaoka, G., Kawai, Y., Omote, K.: Methods for restricting message space in public-key encryption. IEICE Trans. 96(6), 156–1168 (2013)
    • (2013) IEICE Trans. , vol.96 , Issue.6 , pp. 156-1168
    • Sakai, Y.1    Emura, K.2    Hanaoka, G.3    Kawai, Y.4    Omote, K.5
  • 31
    • 45749132089 scopus 로고    scopus 로고
    • Privacy-preserving naïve Bayes classification
    • Vaidya, J., Kantarcioglu, M., Clifton, C.: Privacy-preserving naïve Bayes classification. VLDB J. 17(4), 879–898 (2008)
    • (2008) VLDB J , vol.17 , Issue.4 , pp. 879-898
    • Vaidya, J.1    Kantarcioglu, M.2    Clifton, C.3
  • 32
    • 84874082457 scopus 로고    scopus 로고
    • Improving the DGK comparison protocol
    • Veugen, T.: Improving the DGK comparison protocol. In: WIFS (2012)
    • (2012) WIFS
    • Veugen, T.1
  • 34
    • 12244255356 scopus 로고    scopus 로고
    • Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
    • Wright, R.N., Yang, Z.: Privacy-preserving Bayesian network structure computation on distributed heterogeneous data. In: SIGKDD (2004)
    • (2004) SIGKDD
    • Wright, R.N.1    Yang, Z.2
  • 35
    • 85029574773 scopus 로고    scopus 로고
    • Privately evaluating decision trees and random forests
    • Wu, D.J., Feng, T., Naehrig, M., Lauter, K.: Privately evaluating decision trees and random forests. PoPETs 4, 335–355 (2016)
    • (2016) Popets , vol.4 , pp. 335-355
    • Wu, D.J.1    Feng, T.2    Naehrig, M.3    Lauter, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.