-
1
-
-
84995527907
-
Deep learning with differential privacy
-
ACM
-
Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B., Mironov, I., Talwar, K., Zhang, L., Deep learning with differential privacy. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2016, ACM, 308–318.
-
(2016)
Proceedings of the ACM SIGSAC Conference on Computer and Communications Security
, pp. 308-318
-
-
Abadi, M.1
Chu, A.2
Goodfellow, I.3
McMahan, H.B.4
Mironov, I.5
Talwar, K.6
Zhang, L.7
-
2
-
-
0041783510
-
Privacy-preserving data mining
-
ACM
-
Agrawal, R., Srikant, R., Privacy-preserving data mining. Proceedings of the ACM Sigmod Record, 29, 2000, ACM, 439–450.
-
(2000)
Proceedings of the ACM Sigmod Record
, vol.29
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
79251640709
-
Privacy preserving back-propagation neural network learning over arbitrarily partitioned data
-
Bansal, A., Chen, T., Zhong, S., Privacy preserving back-propagation neural network learning over arbitrarily partitioned data. Neural Comput. Appl. 20:1 (2011), 143–150.
-
(2011)
Neural Comput. Appl.
, vol.20
, Issue.1
, pp. 143-150
-
-
Bansal, A.1
Chen, T.2
Zhong, S.3
-
4
-
-
70350399649
-
Secure evaluation of private linear branching programs with medical applications
-
Springer
-
Barni, M., Failla, P., Kolesnikov, V., Lazzeretti, R., Sadeghi, A.-R., Schneider, T., Secure evaluation of private linear branching programs with medical applications. Proceedings of the European Symposium on Research in Computer Security, 2009, Springer, 424–439.
-
(2009)
Proceedings of the European Symposium on Research in Computer Security
, pp. 424-439
-
-
Barni, M.1
Failla, P.2
Kolesnikov, V.3
Lazzeretti, R.4
Sadeghi, A.-R.5
Schneider, T.6
-
6
-
-
84948821062
-
Machine learning classification over encrypted data.
-
Bost, R., Popa, R.A., Tu, S., Goldwasser, S., Machine learning classification over encrypted data. IACR Cryptol. ePrint Arch., 2014, 2014, 331.
-
(2014)
IACR Cryptol. ePrint Arch.
, vol.2014
, pp. 331
-
-
Bost, R.1
Popa, R.A.2
Tu, S.3
Goldwasser, S.4
-
7
-
-
84899651713
-
Efficient fully homomorphic encryption from (standard) LWE
-
Brakerski, Z., Vaikuntanathan, V., Efficient fully homomorphic encryption from (standard) LWE. SIAM J. Comput. 43:2 (2014), 831–871.
-
(2014)
SIAM J. Comput.
, vol.43
, Issue.2
, pp. 831-871
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
8
-
-
33750283449
-
Privacy preserving data classification with rotation perturbation
-
IEEE
-
Chen, K., Liu, L., Privacy preserving data classification with rotation perturbation. Proceedings of the Fifth IEEE International Conference on Data Mining (ICDM), 2005, IEEE, 4–pp.
-
(2005)
Proceedings of the Fifth IEEE International Conference on Data Mining (ICDM)
, pp. 4
-
-
Chen, K.1
Liu, L.2
-
9
-
-
70350345197
-
Privacy-preserving backpropagation neural network learning
-
Chen, T., Zhong, S., Privacy-preserving backpropagation neural network learning. IEEE Trans. Neural Netw. 20:10 (2009), 1554–1564.
-
(2009)
IEEE Trans. Neural Netw.
, vol.20
, Issue.10
, pp. 1554-1564
-
-
Chen, T.1
Zhong, S.2
-
10
-
-
84906242615
-
New algorithms for secure outsourcing of modular exponentiations
-
Chen, X., Li, J., Ma, J., Tang, Q., Lou, W., New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25:9 (2014), 2386–2396.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.9
, pp. 2386-2396
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
11
-
-
84987657487
-
Verifiable computation over large database with incremental updates
-
Chen, X., Li, J., Weng, J., Ma, J., Lou, W., Verifiable computation over large database with incremental updates. IEEE Trans. Comput. 65:10 (2016), 3184–3195.
-
(2016)
IEEE Trans. Comput.
, vol.65
, Issue.10
, pp. 3184-3195
-
-
Chen, X.1
Li, J.2
Weng, J.3
Ma, J.4
Lou, W.5
-
13
-
-
33746037200
-
Our data, ourselves: privacy via distributed noise generation.
-
Springer
-
Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M., Our data, ourselves: privacy via distributed noise generation. Proceedings of the Eurocrypt, 4004, 2006, Springer, 486–503.
-
(2006)
Proceedings of the Eurocrypt
, vol.4004
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
14
-
-
84905991151
-
The algorithmic foundations of differential privacy
-
Dwork, C., Roth, A., et al. The algorithmic foundations of differential privacy. Found. Trends® Theor. Comput. Sci. 9:3–4 (2014), 211–407.
-
(2014)
Found. Trends® Theor. Comput. Sci.
, vol.9
, Issue.3-4
, pp. 211-407
-
-
Dwork, C.1
Roth, A.2
-
15
-
-
85042850901
-
-
Uci machine learning repository
-
A. Frank, A. Asuncion, et al., Uci machine learning repository, 2010, https://archive.ics.uci.edu/ml/index.php.
-
(2010)
-
-
Frank, A.1
Asuncion, A.2
-
16
-
-
85042177781
-
Cloud-assisted privacy- preserving profile-matching scheme under multiple keys in mobile social network
-
Gao, C.-z., Cheng, Q., Li, X., Xia, S., Cloud-assisted privacy- preserving profile-matching scheme under multiple keys in mobile social network. Cluster Comput., 2018, 10.1007/s10586-017-1649-y.
-
(2018)
Cluster Comput.
-
-
Gao, C.-Z.1
Cheng, Q.2
Li, X.3
Xia, S.4
-
18
-
-
79957974657
-
Implementing Gentrys fully-homomorphic encryption scheme
-
Springer
-
Gentry, C., Halevi, S., Implementing Gentrys fully-homomorphic encryption scheme. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2011, Springer, 129–148.
-
(2011)
Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques
, pp. 129-148
-
-
Gentry, C.1
Halevi, S.2
-
19
-
-
84876012553
-
Ml confidential: Machine learning on encrypted data
-
Springer
-
Graepel, T., Lauter, K., Naehrig, M., Ml confidential: Machine learning on encrypted data. Proceedings of the International Conference on Information Security and Cryptology, 2012, Springer, 1–21.
-
(2012)
Proceedings of the International Conference on Information Security and Cryptology
, pp. 1-21
-
-
Graepel, T.1
Lauter, K.2
Naehrig, M.3
-
20
-
-
84863503836
-
Differentially private search log sanitization with optimal output utility
-
ACM
-
Hong, Y., Vaidya, J., Lu, H., Wu, M., Differentially private search log sanitization with optimal output utility. Proceedings of the 15th International Conference on Extending Database Technology, 2012, ACM, 50–61.
-
(2012)
Proceedings of the 15th International Conference on Extending Database Technology
, pp. 50-61
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
Wu, M.4
-
21
-
-
84951830071
-
Privacy-preserving Naive Bayes classification
-
Springer
-
Huai, M., Huang, L., Yang, W., Li, L., Qi, M., Privacy-preserving Naive Bayes classification. Proceedings of the International Conference on Knowledge Science, Engineering and Management, 2015, Springer, 627–638.
-
(2015)
Proceedings of the International Conference on Knowledge Science, Engineering and Management
, pp. 627-638
-
-
Huai, M.1
Huang, L.2
Yang, W.3
Li, L.4
Qi, M.5
-
22
-
-
84914127581
-
Faster secure two-party computation using garbled circuits.
-
Huang, Y., Evans, D., Katz, J., Malka, L., Faster secure two-party computation using garbled circuits. Proceedings of the USENIX Security Symposium, 201, 2011.
-
(2011)
Proceedings of the USENIX Security Symposium
, vol.201
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
23
-
-
85020050894
-
Insight of the protection for data security under selective opening attacks
-
Huang, Z., Liu, S., Mao, X., Chen, K., Li, J., Insight of the protection for data security under selective opening attacks. Inf. Sci. 412–413 (2017), 223–241.
-
(2017)
Inf. Sci.
, vol.412-413
, pp. 223-241
-
-
Huang, Z.1
Liu, S.2
Mao, X.3
Chen, K.4
Li, J.5
-
24
-
-
32344446366
-
Privacy-preserving distributed k-means clustering over arbitrarily partitioned data
-
ACM
-
Jagannathan, G., Wright, R.N., Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. Proceedings of the Eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, 2005, ACM, 593–599.
-
(2005)
Proceedings of the Eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
, pp. 593-599
-
-
Jagannathan, G.1
Wright, R.N.2
-
25
-
-
26944485666
-
Privacy preserving naive bayes classifier for horizontally partitioned data
-
Kantarcıoglu, M., Vaidya, J., Clifton, C., Privacy preserving naive bayes classifier for horizontally partitioned data. Proceedings of the IEEE ICDM Workshop on Privacy Preserving Data Mining, 2003, 3–9.
-
(2003)
Proceedings of the IEEE ICDM Workshop on Privacy Preserving Data Mining
, pp. 3-9
-
-
Kantarcıoglu, M.1
Vaidya, J.2
Clifton, C.3
-
26
-
-
84865663496
-
Releasing search queries and clicks privately
-
ACM
-
Korolova, A., Kenthapadi, K., Mishra, N., Ntoulas, A., Releasing search queries and clicks privately. Proceedings of the 18th International Conference on World Wide Web, 2009, ACM, 171–180.
-
(2009)
Proceedings of the 18th International Conference on World Wide Web
, pp. 171-180
-
-
Korolova, A.1
Kenthapadi, K.2
Mishra, N.3
Ntoulas, A.4
-
27
-
-
33749576809
-
Cryptographically private support vector machines
-
ACM
-
Laur, S., Lipmaa, H., Mielikäinen, T., Cryptographically private support vector machines. Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006, ACM, 618–624.
-
(2006)
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 618-624
-
-
Laur, S.1
Lipmaa, H.2
Mielikäinen, T.3
-
28
-
-
85042353901
-
Hybridoram: practical oblivious cloud storage with constant bandwidth
-
Li, B., Huang, Y., Liu, Z., Li, J., Tian, Z., Yiu, S.-M., Hybridoram: practical oblivious cloud storage with constant bandwidth. Inf. Sci., 2018, 10.1016/j.ins.2018.02.019.
-
(2018)
Inf. Sci.
-
-
Li, B.1
Huang, Y.2
Liu, Z.3
Li, J.4
Tian, Z.5
Yiu, S.-M.6
-
29
-
-
84901032811
-
Secure deduplication with efficient and reliable convergent key management
-
Li, J., Chen, X., Li, M., Li, J., Lee, P.P., Lou, W., Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25:6 (2014), 1615–1625.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.6
, pp. 1615-1625
-
-
Li, J.1
Chen, X.2
Li, M.3
Li, J.4
Lee, P.P.5
Lou, W.6
-
30
-
-
84921381171
-
Identity-based encryption with outsourced revocation in cloud computing
-
Li, J., Li, J., Chen, X., Jia, C., Lou, W., Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64:2 (2015), 425–437.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.2
, pp. 425-437
-
-
Li, J.1
Li, J.2
Chen, X.3
Jia, C.4
Lou, W.5
-
31
-
-
84927584035
-
A hybrid cloud approach for secure authorized deduplication
-
Li, J., Li, Y.K., Chen, X., Lee, P.P., Lou, W., A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 26:5 (2015), 1206–1216.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.5
, pp. 1206-1216
-
-
Li, J.1
Li, Y.K.2
Chen, X.3
Lee, P.P.4
Lou, W.5
-
32
-
-
84930542540
-
L-Encdb: a lightweight framework for privacy-preserving data queries in cloud computing
-
Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., Wong, D.S., L-Encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl. Based Syst. 79 (2015), 18–26.
-
(2015)
Knowl. Based Syst.
, vol.79
, pp. 18-26
-
-
Li, J.1
Liu, Z.2
Chen, X.3
Xhafa, F.4
Tan, X.5
Wong, D.S.6
-
33
-
-
85041186267
-
Significant permission identification for machine learning based android malware detection
-
Li, J., Sun, L., Yan, Q., Srisa-an, W., Ye, H., Significant permission identification for machine learning based android malware detection. IEEE Trans. Ind. Inf., 2017, 10.1109/TII.2017.2789219.
-
(2017)
IEEE Trans. Ind. Inf.
-
-
Li, J.1
Sun, L.2
Yan, Q.3
Srisa-an, W.4
Ye, H.5
-
34
-
-
85028920194
-
Secure attribute-based data sharing for resource-limited users in cloud computing
-
Li, J., Zhang, Y., Chen, X., Xiang, Y., Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72 (2018), 1–12.
-
(2018)
Comput. Secur.
, vol.72
, pp. 1-12
-
-
Li, J.1
Zhang, Y.2
Chen, X.3
Xiang, Y.4
-
35
-
-
85017138287
-
Privacy-preserving outsourced classification in cloud computing
-
Li, P., Li, J., Huang, Z., Gao, C.-Z., Chen, W.-B., Chen, K., Privacy-preserving outsourced classification in cloud computing. Cluster Comput, 2017, 10.1007/s10586-017-0849-9.
-
(2017)
Cluster Comput
-
-
Li, P.1
Li, J.2
Huang, Z.3
Gao, C.-Z.4
Chen, W.-B.5
Chen, K.6
-
36
-
-
85018906248
-
Multi-key privacy-preserving deep learning in cloud computing
-
Li, P., Li, J., Huang, Z., Li, T., Gao, C.-Z., Yiu, S.-M., Chen, K., Multi-key privacy-preserving deep learning in cloud computing. Future Gener. Comput. Syst. 74 (2017), 76–85.
-
(2017)
Future Gener. Comput. Syst.
, vol.74
, pp. 76-85
-
-
Li, P.1
Li, J.2
Huang, Z.3
Li, T.4
Gao, C.-Z.5
Yiu, S.-M.6
Chen, K.7
-
37
-
-
85008419768
-
CDPS: a cryptographic data publishing system
-
Li, T., Liu, Z., Li, J., Jia, C., Li, K.-C., CDPS: a cryptographic data publishing system. J. Comput. Syst. Sci. 89 (2016), 80–91.
-
(2016)
J. Comput. Syst. Sci.
, vol.89
, pp. 80-91
-
-
Li, T.1
Liu, Z.2
Li, J.3
Jia, C.4
Li, K.-C.5
-
38
-
-
84974555530
-
Privacy preserving data mining
-
Springer
-
Lindell, Y., Pinkas, B., Privacy preserving data mining. Proceedings of the Annual International Cryptology Conference, 2000, Springer, 36–54.
-
(2000)
Proceedings of the Annual International Cryptology Conference
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
39
-
-
70350678967
-
Differentially private recommender systems: building privacy into the net
-
ACM
-
McSherry, F., Mironov, I., Differentially private recommender systems: building privacy into the net. Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2009, ACM, 627–636.
-
(2009)
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 627-636
-
-
McSherry, F.1
Mironov, I.2
-
40
-
-
85068879161
-
Oblivious multi-party machine learning on trusted processors
-
Ohrimenko, O., Schuster, F., Fournet, C., Mehta, A., Nowozin, S., Vaswani, K., Costa, M., Oblivious multi-party machine learning on trusted processors. Proceedings of the USENIX Security, 16, 2016, 619–636.
-
(2016)
Proceedings of the USENIX Security
, vol.16
, pp. 619-636
-
-
Ohrimenko, O.1
Schuster, F.2
Fournet, C.3
Mehta, A.4
Nowozin, S.5
Vaswani, K.6
Costa, M.7
-
42
-
-
84865103996
-
Privacy-preserving back-propagation and extreme learning machine algorithms
-
Samet, S., Miri, A., Privacy-preserving back-propagation and extreme learning machine algorithms. Data Knowl. Eng. 79 (2012), 40–61.
-
(2012)
Data Knowl. Eng.
, vol.79
, pp. 40-61
-
-
Samet, S.1
Miri, A.2
-
43
-
-
79960618403
-
A protocol for privacy preserving neural network learning on horizontally partitioned data
-
Schlitter, N., A protocol for privacy preserving neural network learning on horizontally partitioned data. Proceedings of the PSD, 2008.
-
(2008)
Proceedings of the PSD
-
-
Schlitter, N.1
-
44
-
-
85040682831
-
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
-
Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., Tang, Y., Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl., 2018, 10.1016/j.jnca.2018.01.003.
-
(2018)
J. Netw. Comput. Appl.
-
-
Shen, J.1
Gui, Z.2
Ji, S.3
Shen, J.4
Tan, H.5
Tang, Y.6
-
45
-
-
84954108845
-
Privacy-preserving deep learning
-
ACM
-
Shokri, R., Shmatikov, V., Privacy-preserving deep learning. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, ACM, 1310–1321.
-
(2015)
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
, pp. 1310-1321
-
-
Shokri, R.1
Shmatikov, V.2
-
46
-
-
2942536415
-
Privacy preserving naive Bayes classifier for vertically partitioned data
-
SIAM
-
Vaidya, J., Clifton, C., Privacy preserving naive Bayes classifier for vertically partitioned data. Proceedings of the 2004 SIAM International Conference on Data Mining, 2004, SIAM, 522–526.
-
(2004)
Proceedings of the 2004 SIAM International Conference on Data Mining
, pp. 522-526
-
-
Vaidya, J.1
Clifton, C.2
-
47
-
-
45749132089
-
Privacy-preserving naive Bayes classification
-
Vaidya, J., Kantarcıoğlu, M., Clifton, C., Privacy-preserving naive Bayes classification. Int. J. Very Large Data Bases 17:4 (2008), 879–898.
-
(2008)
Int. J. Very Large Data Bases
, vol.17
, Issue.4
, pp. 879-898
-
-
Vaidya, J.1
Kantarcıoğlu, M.2
Clifton, C.3
-
48
-
-
84893236174
-
Differentially private naive bayes classification
-
IEEE Computer Society
-
Vaidya, J., Shafiq, B., Basu, A., Hong, Y., Differentially private naive bayes classification. Proceedings of the IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), vol. 01, 2013, IEEE Computer Society, 571–576.
-
(2013)
Proceedings of the IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
, vol.1
, pp. 571-576
-
-
Vaidya, J.1
Shafiq, B.2
Basu, A.3
Hong, Y.4
-
49
-
-
84997514373
-
New directly revocable attribute-based encryption scheme and its application in cloud storage environment
-
Wang, H., Zheng, Z., Wu, L., Li, P., New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Cluster Comput. 20:3 (2017), 2385–2392.
-
(2017)
Cluster Comput.
, vol.20
, Issue.3
, pp. 2385-2392
-
-
Wang, H.1
Zheng, Z.2
Wu, L.3
Li, P.4
-
50
-
-
85042855631
-
-
Crypto-nets: neural networks over encrypted data
-
P. Xie, M. Bilenko, T. Finley, R. Gilad-Bachrach, K. Lauter, M. Naehrig, Crypto-nets: neural networks over encrypted data, 2014, https://arxiv.org/pdf/1412.6181.pdf.
-
(2014)
-
-
Xie, P.1
Bilenko, M.2
Finley, T.3
Gilad-Bachrach, R.4
Lauter, K.5
Naehrig, M.6
-
51
-
-
85042177655
-
Dynamic fully homomorphic encryption-based Merkle tree for lightweight streaming authenticated data structures
-
Xu, J., Wei, L., Zhang, Y., Wang, A., Zhou, F., Gao, C.-z., Dynamic fully homomorphic encryption-based Merkle tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl., 2018, 10.1016/j.jnca.2018.01.014.
-
(2018)
J. Netw. Comput. Appl.
-
-
Xu, J.1
Wei, L.2
Zhang, Y.3
Wang, A.4
Zhou, F.5
Gao, C.-Z.6
-
53
-
-
59149087052
-
Privacy-preserving Naive Bayes classification on distributed data via semi-trusted mixers
-
Yi, X., Zhang, Y., Privacy-preserving Naive Bayes classification on distributed data via semi-trusted mixers. Inf. Syst. 34:3 (2009), 371–380.
-
(2009)
Inf. Syst.
, vol.34
, Issue.3
, pp. 371-380
-
-
Yi, X.1
Zhang, Y.2
-
54
-
-
84901924319
-
Privacy preserving back-propagation neural network learning made practical with cloud computing
-
Yuan, J., Yu, S., Privacy preserving back-propagation neural network learning made practical with cloud computing. IEEE Trans. Parallel Distrib. Syst. 25:1 (2014), 212–221.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.1
, pp. 212-221
-
-
Yuan, J.1
Yu, S.2
|