-
1
-
-
85042867479
-
-
UCI Machine Learning Repository. Irvine, CA: University of California, School of Information and Computer Science.
-
M. Lichman. UCI Machine Learning Repository. Irvine, CA: University of California, School of Information and Computer Science, 2013. http://archive.ics.uci.edu/ml.
-
(2013)
-
-
Lichman, M.1
-
2
-
-
35048875418
-
-
Springer Berlin Heidelberg, Berlin, Heidelberg
-
Aggarwal, G., Mishra, N., Pinkas, B., Secure Computation of the k th-Ranked Element, 40–55, 2004, Springer, Berlin Heidelberg, Berlin, Heidelberg.
-
(2004)
Secure Computation of the k th-Ranked Element, 40–55
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
3
-
-
85042878371
-
-
Encrypted statistical machine learning: new privacy preserving methods. arXiv.
-
L. J. M. Aslett, P. M. Esperança, and C. C. Holmes. Encrypted statistical machine learning: new privacy preserving methods. arXiv, 2015. http://arxiv.org/abs/1508.06845.
-
(2015)
-
-
Aslett, L.J.M.1
Esperança, P.M.2
Holmes, C.C.3
-
4
-
-
70350399649
-
Secure evaluation of private linear branching programs with medical applications
-
Springer-Verlag Berlin, Heidelberg
-
Barni, M., Failla, P., Kolesnikov, V., Lazzeretti, R., Sadeghi, A.R., Schneider, T., Secure evaluation of private linear branching programs with medical applications. Proceedings of the 14th European Conference on Research in Computer Security, ESORICS, 2009, Springer-Verlag, Berlin, Heidelberg, 424–439.
-
(2009)
Proceedings of the 14th European Conference on Research in Computer Security, ESORICS
, pp. 424-439
-
-
Barni, M.1
Failla, P.2
Kolesnikov, V.3
Lazzeretti, R.4
Sadeghi, A.R.5
Schneider, T.6
-
5
-
-
77949846904
-
Efficient privacy-preserving classification of ECG signals, London, UK
-
IEEE.
-
Barni, M., Failla, P., Lazzeretti, R., Paus, A., Sadeghi, A., Schneider, T., Kolesnikov, V., Efficient privacy-preserving classification of ECG signals, London, UK. Proceedings of the First IEEE International Workshop on Information Forensics and Security, WIFS, 2009, 91–95 IEEE.
-
(2009)
Proceedings of the First IEEE International Workshop on Information Forensics and Security, WIFS
, pp. 91-95
-
-
Barni, M.1
Failla, P.2
Lazzeretti, R.3
Paus, A.4
Sadeghi, A.5
Schneider, T.6
Kolesnikov, V.7
-
6
-
-
84881232126
-
Efficient garbling from a fixed-key blockcipher
-
Bellare, M., Hoang, V.T., Keelveedhi, S., Rogaway, P., Efficient garbling from a fixed-key blockcipher. IEEE Symp. Secur. Priv., 2013, 478–492.
-
(2013)
IEEE Symp. Secur. Priv.
, pp. 478-492
-
-
Bellare, M.1
Hoang, V.T.2
Keelveedhi, S.3
Rogaway, P.4
-
7
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation, New York, NY, USA, ACM
-
Ben-Or, M., Goldwasser, S., Wigderson, A., Completeness theorems for non-cryptographic fault-tolerant distributed computation, New York, NY, USA, ACM. Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, 1988.
-
(1988)
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
8
-
-
0036139314
-
A neural network classifier capable of recognizing the patterns of all major subcellular structures in fluorescence microscope images of hela cells
-
Boland, M.V., Murphy, R.F., A neural network classifier capable of recognizing the patterns of all major subcellular structures in fluorescence microscope images of hela cells. Bioinformatics 17:12 (2001), 1213–1223.
-
(2001)
Bioinformatics
, vol.17
, Issue.12
, pp. 1213-1223
-
-
Boland, M.V.1
Murphy, R.F.2
-
9
-
-
85098887199
-
Machine learning classification over encrypted data
-
February 8-11 The Internet Society
-
Bost, R., Popa, R.A., Tu, S., Goldwasser, S., Machine learning classification over encrypted data. Proceedings of the 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, 2015 February 8-11 The Internet Society.
-
(2015)
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA
-
-
Bost, R.1
Popa, R.A.2
Tu, S.3
Goldwasser, S.4
-
10
-
-
84894564812
-
-
Springer Berlin Heidelberg, Berlin, Heidelberg
-
Brickell, J., Shmatikov, V., Privacy-Preserving Classifier Learning, 2009, Springer, Berlin Heidelberg, Berlin, Heidelberg.
-
(2009)
Privacy-Preserving Classifier Learning
-
-
Brickell, J.1
Shmatikov, V.2
-
11
-
-
33749254096
-
An empirical comparison of supervised learning algorithms
-
161–168
-
Caruana, R., Niculescu-Mizil, A., An empirical comparison of supervised learning algorithms. Proceedings of the 23rd International Conference on Machine Learning, ICML, New York, NY, USA, ACM, 2006 161–168.
-
(2006)
Proceedings of the 23rd International Conference on Machine Learning, ICML, New York, NY, USA, ACM
-
-
Caruana, R.1
Niculescu-Mizil, A.2
-
12
-
-
84945267655
-
Flexible neural trees based early stage identification for ip traffic
-
Chen, Z., Peng, L., Gao, C., Yang, B., Chen, Y., Li, J., Flexible neural trees based early stage identification for ip traffic. Soft Comput. 21:8 (2017), 2035–2046.
-
(2017)
Soft Comput.
, vol.21
, Issue.8
, pp. 2035-2046
-
-
Chen, Z.1
Peng, L.2
Gao, C.3
Yang, B.4
Chen, Y.5
Li, J.6
-
13
-
-
70449575839
-
Homomorphic encryption and secure comparison
-
Damgard, I., Geisler, M., Kroigard, M., Homomorphic encryption and secure comparison. Int. J. Appl. Cryptogr. 1:1 (2008), 22–31.
-
(2008)
Int. J. Appl. Cryptogr.
, vol.1
, Issue.1
, pp. 22-31
-
-
Damgard, I.1
Geisler, M.2
Kroigard, M.3
-
14
-
-
84948800105
-
Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols
-
Springer-Verlag New York, NY, USA Inc.
-
David, B., Dowsley, R., Katti, R., Nascimento, A.C., Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols. Proceedings of the 9th International Conference on Provable Security, vol. 9451, 2015, Springer-Verlag, New York, NY, USA, 354–367 Inc.
-
(2015)
Proceedings of the 9th International Conference on Provable Security
, vol.9451
, pp. 354-367
-
-
David, B.1
Dowsley, R.2
Katti, R.3
Nascimento, A.C.4
-
15
-
-
79960871684
-
Secure friend discovery in mobile social networks
-
10–15 April
-
Dong, W., Dave, V., Qiu, L., Zhang, Y., Secure friend discovery in mobile social networks. Proceedings of the 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, Shanghai, China, 2011, 1647–1655 10–15 April.
-
(2011)
Proceedings of the 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, Shanghai, China
, pp. 1647-1655
-
-
Dong, W.1
Dave, V.2
Qiu, L.3
Zhang, Y.4
-
16
-
-
69949163699
-
Privacy-preserving face recognition
-
Springer-Verlag Berlin, Heidelberg
-
Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T., Privacy-preserving face recognition. Proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS, 2009, Springer-Verlag, Berlin, Heidelberg, 235–253.
-
(2009)
Proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
17
-
-
0022080529
-
A randomized protocol for signing contracts
-
Even, S., Goldreich, O., Lempel, A., A randomized protocol for signing contracts. Commun. ACM 28:6 (1985), 637–647.
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
18
-
-
12244263240
-
-
Springer Berlin Heidelberg, Berlin, Heidelberg
-
Freedman, M.J., Nissim, K., Pinkas, B., Efficient Private Matching and Set Intersection, 2004, Springer, Berlin Heidelberg, Berlin, Heidelberg.
-
(2004)
Efficient Private Matching and Set Intersection
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
19
-
-
67650465926
-
How to construct efficient on-line/off-line threshold signature schemes through the simulation approach
-
Gao, C.z., Wei, B., Xie, D., Tang, C., How to construct efficient on-line/off-line threshold signature schemes through the simulation approach. Concurrency Comput. Pract. Exp. 21:10 (2009), 1351–1372.
-
(2009)
Concurrency Comput. Pract. Exp.
, vol.21
, Issue.10
, pp. 1351-1372
-
-
Gao, C.Z.1
Wei, B.2
Xie, D.3
Tang, C.4
-
20
-
-
67651233009
-
A further improved online/offline signature scheme
-
Gao, C.z., Yao, Z.a., A further improved online/offline signature scheme. Fundam. Inform. 91:3-4 (2009), 523–532.
-
(2009)
Fundam. Inform.
, vol.91
, Issue.3-4
, pp. 523-532
-
-
Gao, C.Z.1
Yao, Z.A.2
-
21
-
-
0003691180
-
-
Cambridge University Press New York, NY, USA
-
Goldreich, O., Foundations of Cryptography: Basic Applications, 2, 2004, Cambridge University Press, New York, NY, USA.
-
(2004)
Foundations of Cryptography: Basic Applications
, vol.2
-
-
Goldreich, O.1
-
22
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
ACM Press New York, NY USA
-
Goldreich, O., Micali, S., Wigderson, A., How to play any mental game or a completeness theorem for protocols with honest majority. Proceedings of the 19th Annual Symposium on Theory of Computing (STOC), 1987, ACM Press, New York, NY USA, 218–229.
-
(1987)
Proceedings of the 19th Annual Symposium on Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
23
-
-
85050160774
-
Probabilistic encryption and how to play mental poker keeping secret all partial information
-
ACM New York, NY, USA
-
Goldwasser, S., Micali, S., Probabilistic encryption and how to play mental poker keeping secret all partial information. Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, STOC, 1982, ACM, New York, NY, USA, 365–377.
-
(1982)
Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, STOC
, pp. 365-377
-
-
Goldwasser, S.1
Micali, S.2
-
24
-
-
84995810068
-
A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud
-
Hu, G., Xiao, D., Xiang, T., Bai, S., Zhang, Y., A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. Inf. Sci. 387 (2017), 132–145.
-
(2017)
Inf. Sci.
, vol.387
, pp. 132-145
-
-
Hu, G.1
Xiao, D.2
Xiang, T.3
Bai, S.4
Zhang, Y.5
-
25
-
-
84957069814
-
Text categorization with support vector machines: Learning with many relevant features
-
Springer
-
Joachims, T., Text categorization with support vector machines: Learning with many relevant features. Proceedings of the European Conference on Machine Learning, 1998, Springer, 137–142.
-
(1998)
Proceedings of the European Conference on Machine Learning
, pp. 137-142
-
-
Joachims, T.1
-
26
-
-
26944485666
-
Privacy preserving Naive Bayes classifier for horizontally partitioned data
-
Kantarcıoglu, M., Vaidya, J., Clifton, C., Privacy preserving Naive Bayes classifier for horizontally partitioned data. Proceedings of the IEEE ICDM Workshop on Privacy Preserving Data Mining, 2003, 3–9.
-
(2003)
Proceedings of the IEEE ICDM Workshop on Privacy Preserving Data Mining
, pp. 3-9
-
-
Kantarcıoglu, M.1
Vaidya, J.2
Clifton, C.3
-
27
-
-
84982190124
-
SHIELD: scalable homomorphic implementation of encrypted data-classifiers
-
Khedr, A., Gulak, P.G., Vaikuntanathan, V., SHIELD: scalable homomorphic implementation of encrypted data-classifiers. IEEE Trans. Comput. 65:9 (2016), 2848–2858.
-
(2016)
IEEE Trans. Comput.
, vol.65
, Issue.9
, pp. 2848-2858
-
-
Khedr, A.1
Gulak, P.G.2
Vaikuntanathan, V.3
-
28
-
-
84884483426
-
Improved ot extension for transferring short secrets
-
Springer
-
Kolesnikov, V., Kumaresan, R., Improved ot extension for transferring short secrets. Proceedings of the Advances in Cryptology–CRYPTO, 2013, Springer, 54–70.
-
(2013)
Proceedings of the Advances in Cryptology–CRYPTO
, pp. 54-70
-
-
Kolesnikov, V.1
Kumaresan, R.2
-
29
-
-
84887259053
-
Improving accuracy of classification models induced from anonymized datasets
-
Last, M., Tassa, T., Zhmudyak, A., Shmueli, E., Improving accuracy of classification models induced from anonymized datasets. Inf. Sci. 256 (2014), 138–161.
-
(2014)
Inf. Sci.
, vol.256
, pp. 138-161
-
-
Last, M.1
Tassa, T.2
Zhmudyak, A.3
Shmueli, E.4
-
30
-
-
84946905043
-
Secure distributed deduplication systems with improved reliability
-
Li, J., Chen, X., Huang, X., Tang, S., Xiang, Y., Hassan, M.M., Alelaiwi, A., Secure distributed deduplication systems with improved reliability. IEEE Trans. Comput. 64:12 (2015), 3569–3579.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.12
, pp. 3569-3579
-
-
Li, J.1
Chen, X.2
Huang, X.3
Tang, S.4
Xiang, Y.5
Hassan, M.M.6
Alelaiwi, A.7
-
31
-
-
84921381171
-
Identity-based encryption with outsourced revocation in cloud computing
-
Li, J., Li, J., Chen, X., Jia, C., Lou, W., Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64:2 (2015), 425–437.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.2
, pp. 425-437
-
-
Li, J.1
Li, J.2
Chen, X.3
Jia, C.4
Lou, W.5
-
32
-
-
85070850121
-
Privacy-preserving outsourced classification in cloud computing
-
Li, P., Li, J., Huang, Z., Gao, C.Z., Chen, W.B., Chen, K., Privacy-preserving outsourced classification in cloud computing. Cluster Comput, 2017.
-
(2017)
Cluster Comput
-
-
Li, P.1
Li, J.2
Huang, Z.3
Gao, C.Z.4
Chen, W.B.5
Chen, K.6
-
33
-
-
85018906248
-
Multi-key privacy-preserving deep learning in cloud computing
-
Li, P., Li, J., Huang, Z., Li, T., Gao, C., Yiu, S., Chen, K., Multi-key privacy-preserving deep learning in cloud computing. Future Gener. Comp. Syst. 74 (2017), 76–85.
-
(2017)
Future Gener. Comp. Syst.
, vol.74
, pp. 76-85
-
-
Li, P.1
Li, J.2
Huang, Z.3
Li, T.4
Gao, C.5
Yiu, S.6
Chen, K.7
-
34
-
-
84949198542
-
A distributed ensemble approach for mining healthcare data under privacy constraints
-
Li, Y., Bai, C., Reddy, C.K., A distributed ensemble approach for mining healthcare data under privacy constraints. Inf. Sci. 330 (2016), 245–259.
-
(2016)
Inf. Sci.
, vol.330
, pp. 245-259
-
-
Li, Y.1
Bai, C.2
Reddy, C.K.3
-
35
-
-
33746437508
-
Privacy preserving data mining
-
Lindell, Y., Pinkas, B., Privacy preserving data mining. J. Cryptol., 15(3), 2002.
-
(2002)
J. Cryptol.
, vol.15
, Issue.3
-
-
Lindell, Y.1
Pinkas, B.2
-
36
-
-
38049136534
-
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
-
Springer Berlin Heidelberg, Berlin, Heidelberg
-
Lindell, Y., Pinkas, B., An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. 2007, Springer Berlin Heidelberg, Berlin, Heidelberg, 52–78.
-
(2007)
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
37
-
-
64249101946
-
A proof of security of Yao's protocol for two-party computation
-
Lindell, Y., Pinkas, B., A proof of security of Yao's protocol for two-party computation. J. Cryptol. 22:2 (2009), 161–188.
-
(2009)
J. Cryptol.
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
38
-
-
84963815241
-
Privacy-preserving patient-centric clinical decision support system on Naïve Bayesian classification
-
Liu, X., Lu, R., Ma, J., Chen, L., Qin, B., Privacy-preserving patient-centric clinical decision support system on Naïve Bayesian classification. IEEE J. Biomed. Health Inf. 20:2 (2016), 655–668.
-
(2016)
IEEE J. Biomed. Health Inf.
, vol.20
, Issue.2
, pp. 655-668
-
-
Liu, X.1
Lu, R.2
Ma, J.3
Chen, L.4
Qin, B.5
-
39
-
-
85009926778
-
Finger vein secure biometric template generation based on deep learning
-
Liu, Y., Ling, J., Liu, Z., Shen, J., Gao, C., Finger vein secure biometric template generation based on deep learning. Soft. Comput., 2017, 10.1007/s00500-017-2487-9.
-
(2017)
Soft. Comput.
-
-
Liu, Y.1
Ling, J.2
Liu, Z.3
Shen, J.4
Gao, C.5
-
40
-
-
84962073638
-
Social choice in distributed classification tasks: dealing with vertically partitioned data
-
Mendoza, M.R., Bazzan, A.L.C., Social choice in distributed classification tasks: dealing with vertically partitioned data. Inf. Sci. 332 (2016), 56–71.
-
(2016)
Inf. Sci.
, vol.332
, pp. 56-71
-
-
Mendoza, M.R.1
Bazzan, A.L.C.2
-
41
-
-
0034326217
-
Bayesian face recognition
-
Moghaddam, B., Jebara, T., Pentland, A., Bayesian face recognition. Pattern Recognit. 33:11 (2000), 1771–1782.
-
(2000)
Pattern Recognit.
, vol.33
, Issue.11
, pp. 1771-1782
-
-
Moghaddam, B.1
Jebara, T.2
Pentland, A.3
-
42
-
-
33847410499
-
Kernel-based Naive Bayes classifier for breast cancer prediction
-
Nahar, J., Chen, Y.P.P., Ali, S., Kernel-based Naive Bayes classifier for breast cancer prediction. J. Biol. Syst. 15:01 (2007), 17–25.
-
(2007)
J. Biol. Syst.
, vol.15
, Issue.1
, pp. 17-25
-
-
Nahar, J.1
Chen, Y.P.P.2
Ali, S.3
-
43
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer-Verlag Berlin, Heidelberg
-
Paillier, P., Public-key cryptosystems based on composite degree residuosity classes. Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT, 1999, Springer-Verlag, Berlin, Heidelberg, 223–238.
-
(1999)
Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
44
-
-
51849126892
-
A framework for efficient and composable oblivious transfer
-
Springer
-
Peikert, C., Vaikuntanathan, V., Waters, B., A framework for efficient and composable oblivious transfer. Crypto, vol. 5157, 2008, Springer, 554–571.
-
(2008)
Crypto
, vol.5157
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
-
45
-
-
77956992104
-
Secure two-party computation is practical
-
Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C., Secure two-party computation is practical. IACR Cryptol. ePrint Arch., 2009(314), 2009.
-
(2009)
IACR Cryptol. ePrint Arch.
, vol.2009
, Issue.314
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
46
-
-
80051931970
-
Privacy-preserving approach to Bayesian network structure learning from distributed data
-
ACM New York,NY, USA
-
Regnier-Coudert, O., McCall, J., Privacy-preserving approach to Bayesian network structure learning from distributed data. Proceedings of the 13th Annual Conference Companion on Genetic and Evolutionary Computation, GECCO, 2011, ACM, New York,NY, USA, 815–816.
-
(2011)
Proceedings of the 13th Annual Conference Companion on Genetic and Evolutionary Computation, GECCO
, pp. 815-816
-
-
Regnier-Coudert, O.1
McCall, J.2
-
48
-
-
0003584577
-
Artificial Intelligence: A Modern Approach
-
second ed. Pearson Education
-
Russell, S.J., Norvig, P., Artificial Intelligence: A Modern Approach. second ed., 2003, Pearson Education.
-
(2003)
-
-
Russell, S.J.1
Norvig, P.2
-
49
-
-
77954610725
-
Efficient privacy-preserving face recognition
-
Springer-Verlag Berlin,Heidelberg
-
Sadeghi, A.R., Schneider, T., Wehrenberg, I., Efficient privacy-preserving face recognition. Proceedings of the 12th International Conference on Information Security and Cryptology, ICISC, 2010, Springer-Verlag, Berlin,Heidelberg, 229–244.
-
(2010)
Proceedings of the 12th International Conference on Information Security and Cryptology, ICISC
, pp. 229-244
-
-
Sadeghi, A.R.1
Schneider, T.2
Wehrenberg, I.3
-
50
-
-
0026154509
-
A survey of decision tree classifier methodology
-
Safavian, S.R., Landgrebe, D., A survey of decision tree classifier methodology. Syst. Man. Cybern. IEEE Trans. 21:3 (1991), 660–674.
-
(1991)
Syst. Man. Cybern. IEEE Trans.
, vol.21
, Issue.3
, pp. 660-674
-
-
Safavian, S.R.1
Landgrebe, D.2
-
51
-
-
0009304541
-
A Bayesian approach to filtering junk E-mail, Madison, Wisconsin
-
AAAI Technical Report WS-98-05
-
Sahami, M., Dumais, S., Heckerman, D., Horvitz, E., A Bayesian approach to filtering junk E-mail, Madison, Wisconsin. Proceedings of the Workshop on Learning for Text Categorization, 1998 AAAI Technical Report WS-98-05.
-
(1998)
Proceedings of the Workshop on Learning for Text Categorization
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
52
-
-
84954108845
-
Privacy-preserving deep learning
-
ACM New York, NY, USA
-
Shokri, R., Shmatikov, V., Privacy-preserving deep learning. Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, CCS, 2015, ACM, New York, NY, USA, 1310–1321.
-
(2015)
Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, CCS
, pp. 1310-1321
-
-
Shokri, R.1
Shmatikov, V.2
-
53
-
-
45749132089
-
Privacy-preserving Naive Bayes classification
-
Vaidya, J., Kantarcioglu, M., Clifton, C., Privacy-preserving Naive Bayes classification. VLDB J. 17:4 (2008), 879–898.
-
(2008)
VLDB J.
, vol.17
, Issue.4
, pp. 879-898
-
-
Vaidya, J.1
Kantarcioglu, M.2
Clifton, C.3
-
54
-
-
85042875816
-
-
Comparing encrypted data. Technical Report Multimedia Signal Processing Group, Delft University of Technology, The Netherlands, and TNO Information and Communication Technology, Delft, The Netherlands.
-
T. Veugen, Comparing encrypted data. Technical Report Multimedia Signal Processing Group, Delft University of Technology, The Netherlands, and TNO Information and Communication Technology, Delft, The Netherlands, 2011.
-
(2011)
-
-
Veugen, T.1
-
55
-
-
12244255356
-
Privacy-preserving bayesian network structure computation on distributed heterogeneous data
-
ACM New York, NY, USA
-
Wright, R., Yang, Z., Privacy-preserving bayesian network structure computation on distributed heterogeneous data. Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD, 2004, ACM, New York, NY, USA, 713–718.
-
(2004)
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD
, pp. 713-718
-
-
Wright, R.1
Yang, Z.2
-
57
-
-
84965170488
-
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
-
Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H., You, I., Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf. Sci. 379 (2017), 42–61.
-
(2017)
Inf. Sci.
, vol.379
, pp. 42-61
-
-
Zhang, Y.1
Chen, X.2
Li, J.3
Wong, D.S.4
Li, H.5
You, I.6
|