메뉴 건너뛰기




Volumn 444, Issue , 2018, Pages 89-104

Differentially private Naive Bayes learning over multiple data sources

Author keywords

Differential privacy; Naive Bayes classification; Privacy preserving

Indexed keywords

CLASSIFIERS; DATA PRIVACY; LEARNING ALGORITHMS; LEARNING SYSTEMS;

EID: 85042848600     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2018.02.056     Document Type: Article
Times cited : (190)

References (54)
  • 3
    • 79251640709 scopus 로고    scopus 로고
    • Privacy preserving back-propagation neural network learning over arbitrarily partitioned data
    • Bansal, A., Chen, T., Zhong, S., Privacy preserving back-propagation neural network learning over arbitrarily partitioned data. Neural Comput. Appl. 20:1 (2011), 143–150.
    • (2011) Neural Comput. Appl. , vol.20 , Issue.1 , pp. 143-150
    • Bansal, A.1    Chen, T.2    Zhong, S.3
  • 7
    • 84899651713 scopus 로고    scopus 로고
    • Efficient fully homomorphic encryption from (standard) LWE
    • Brakerski, Z., Vaikuntanathan, V., Efficient fully homomorphic encryption from (standard) LWE. SIAM J. Comput. 43:2 (2014), 831–871.
    • (2014) SIAM J. Comput. , vol.43 , Issue.2 , pp. 831-871
    • Brakerski, Z.1    Vaikuntanathan, V.2
  • 9
    • 70350345197 scopus 로고    scopus 로고
    • Privacy-preserving backpropagation neural network learning
    • Chen, T., Zhong, S., Privacy-preserving backpropagation neural network learning. IEEE Trans. Neural Netw. 20:10 (2009), 1554–1564.
    • (2009) IEEE Trans. Neural Netw. , vol.20 , Issue.10 , pp. 1554-1564
    • Chen, T.1    Zhong, S.2
  • 10
    • 84906242615 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of modular exponentiations
    • Chen, X., Li, J., Ma, J., Tang, Q., Lou, W., New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25:9 (2014), 2386–2396.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.9 , pp. 2386-2396
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 11
    • 84987657487 scopus 로고    scopus 로고
    • Verifiable computation over large database with incremental updates
    • Chen, X., Li, J., Weng, J., Ma, J., Lou, W., Verifiable computation over large database with incremental updates. IEEE Trans. Comput. 65:10 (2016), 3184–3195.
    • (2016) IEEE Trans. Comput. , vol.65 , Issue.10 , pp. 3184-3195
    • Chen, X.1    Li, J.2    Weng, J.3    Ma, J.4    Lou, W.5
  • 14
    • 84905991151 scopus 로고    scopus 로고
    • The algorithmic foundations of differential privacy
    • Dwork, C., Roth, A., et al. The algorithmic foundations of differential privacy. Found. Trends® Theor. Comput. Sci. 9:3–4 (2014), 211–407.
    • (2014) Found. Trends® Theor. Comput. Sci. , vol.9 , Issue.3-4 , pp. 211-407
    • Dwork, C.1    Roth, A.2
  • 15
    • 85042850901 scopus 로고    scopus 로고
    • Uci machine learning repository
    • A. Frank, A. Asuncion, et al., Uci machine learning repository, 2010, https://archive.ics.uci.edu/ml/index.php.
    • (2010)
    • Frank, A.1    Asuncion, A.2
  • 16
    • 85042177781 scopus 로고    scopus 로고
    • Cloud-assisted privacy- preserving profile-matching scheme under multiple keys in mobile social network
    • Gao, C.-z., Cheng, Q., Li, X., Xia, S., Cloud-assisted privacy- preserving profile-matching scheme under multiple keys in mobile social network. Cluster Comput., 2018, 10.1007/s10586-017-1649-y.
    • (2018) Cluster Comput.
    • Gao, C.-Z.1    Cheng, Q.2    Li, X.3    Xia, S.4
  • 23
    • 85020050894 scopus 로고    scopus 로고
    • Insight of the protection for data security under selective opening attacks
    • Huang, Z., Liu, S., Mao, X., Chen, K., Li, J., Insight of the protection for data security under selective opening attacks. Inf. Sci. 412–413 (2017), 223–241.
    • (2017) Inf. Sci. , vol.412-413 , pp. 223-241
    • Huang, Z.1    Liu, S.2    Mao, X.3    Chen, K.4    Li, J.5
  • 28
    • 85042353901 scopus 로고    scopus 로고
    • Hybridoram: practical oblivious cloud storage with constant bandwidth
    • Li, B., Huang, Y., Liu, Z., Li, J., Tian, Z., Yiu, S.-M., Hybridoram: practical oblivious cloud storage with constant bandwidth. Inf. Sci., 2018, 10.1016/j.ins.2018.02.019.
    • (2018) Inf. Sci.
    • Li, B.1    Huang, Y.2    Liu, Z.3    Li, J.4    Tian, Z.5    Yiu, S.-M.6
  • 29
    • 84901032811 scopus 로고    scopus 로고
    • Secure deduplication with efficient and reliable convergent key management
    • Li, J., Chen, X., Li, M., Li, J., Lee, P.P., Lou, W., Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25:6 (2014), 1615–1625.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.6 , pp. 1615-1625
    • Li, J.1    Chen, X.2    Li, M.3    Li, J.4    Lee, P.P.5    Lou, W.6
  • 30
    • 84921381171 scopus 로고    scopus 로고
    • Identity-based encryption with outsourced revocation in cloud computing
    • Li, J., Li, J., Chen, X., Jia, C., Lou, W., Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64:2 (2015), 425–437.
    • (2015) IEEE Trans. Comput. , vol.64 , Issue.2 , pp. 425-437
    • Li, J.1    Li, J.2    Chen, X.3    Jia, C.4    Lou, W.5
  • 32
    • 84930542540 scopus 로고    scopus 로고
    • L-Encdb: a lightweight framework for privacy-preserving data queries in cloud computing
    • Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., Wong, D.S., L-Encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl. Based Syst. 79 (2015), 18–26.
    • (2015) Knowl. Based Syst. , vol.79 , pp. 18-26
    • Li, J.1    Liu, Z.2    Chen, X.3    Xhafa, F.4    Tan, X.5    Wong, D.S.6
  • 33
    • 85041186267 scopus 로고    scopus 로고
    • Significant permission identification for machine learning based android malware detection
    • Li, J., Sun, L., Yan, Q., Srisa-an, W., Ye, H., Significant permission identification for machine learning based android malware detection. IEEE Trans. Ind. Inf., 2017, 10.1109/TII.2017.2789219.
    • (2017) IEEE Trans. Ind. Inf.
    • Li, J.1    Sun, L.2    Yan, Q.3    Srisa-an, W.4    Ye, H.5
  • 34
    • 85028920194 scopus 로고    scopus 로고
    • Secure attribute-based data sharing for resource-limited users in cloud computing
    • Li, J., Zhang, Y., Chen, X., Xiang, Y., Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72 (2018), 1–12.
    • (2018) Comput. Secur. , vol.72 , pp. 1-12
    • Li, J.1    Zhang, Y.2    Chen, X.3    Xiang, Y.4
  • 35
    • 85017138287 scopus 로고    scopus 로고
    • Privacy-preserving outsourced classification in cloud computing
    • Li, P., Li, J., Huang, Z., Gao, C.-Z., Chen, W.-B., Chen, K., Privacy-preserving outsourced classification in cloud computing. Cluster Comput, 2017, 10.1007/s10586-017-0849-9.
    • (2017) Cluster Comput
    • Li, P.1    Li, J.2    Huang, Z.3    Gao, C.-Z.4    Chen, W.-B.5    Chen, K.6
  • 37
  • 42
    • 84865103996 scopus 로고    scopus 로고
    • Privacy-preserving back-propagation and extreme learning machine algorithms
    • Samet, S., Miri, A., Privacy-preserving back-propagation and extreme learning machine algorithms. Data Knowl. Eng. 79 (2012), 40–61.
    • (2012) Data Knowl. Eng. , vol.79 , pp. 40-61
    • Samet, S.1    Miri, A.2
  • 43
    • 79960618403 scopus 로고    scopus 로고
    • A protocol for privacy preserving neural network learning on horizontally partitioned data
    • Schlitter, N., A protocol for privacy preserving neural network learning on horizontally partitioned data. Proceedings of the PSD, 2008.
    • (2008) Proceedings of the PSD
    • Schlitter, N.1
  • 44
    • 85040682831 scopus 로고    scopus 로고
    • Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
    • Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., Tang, Y., Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl., 2018, 10.1016/j.jnca.2018.01.003.
    • (2018) J. Netw. Comput. Appl.
    • Shen, J.1    Gui, Z.2    Ji, S.3    Shen, J.4    Tan, H.5    Tang, Y.6
  • 49
    • 84997514373 scopus 로고    scopus 로고
    • New directly revocable attribute-based encryption scheme and its application in cloud storage environment
    • Wang, H., Zheng, Z., Wu, L., Li, P., New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Cluster Comput. 20:3 (2017), 2385–2392.
    • (2017) Cluster Comput. , vol.20 , Issue.3 , pp. 2385-2392
    • Wang, H.1    Zheng, Z.2    Wu, L.3    Li, P.4
  • 51
    • 85042177655 scopus 로고    scopus 로고
    • Dynamic fully homomorphic encryption-based Merkle tree for lightweight streaming authenticated data structures
    • Xu, J., Wei, L., Zhang, Y., Wang, A., Zhou, F., Gao, C.-z., Dynamic fully homomorphic encryption-based Merkle tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl., 2018, 10.1016/j.jnca.2018.01.014.
    • (2018) J. Netw. Comput. Appl.
    • Xu, J.1    Wei, L.2    Zhang, Y.3    Wang, A.4    Zhou, F.5    Gao, C.-Z.6
  • 53
    • 59149087052 scopus 로고    scopus 로고
    • Privacy-preserving Naive Bayes classification on distributed data via semi-trusted mixers
    • Yi, X., Zhang, Y., Privacy-preserving Naive Bayes classification on distributed data via semi-trusted mixers. Inf. Syst. 34:3 (2009), 371–380.
    • (2009) Inf. Syst. , vol.34 , Issue.3 , pp. 371-380
    • Yi, X.1    Zhang, Y.2
  • 54
    • 84901924319 scopus 로고    scopus 로고
    • Privacy preserving back-propagation neural network learning made practical with cloud computing
    • Yuan, J., Yu, S., Privacy preserving back-propagation neural network learning made practical with cloud computing. IEEE Trans. Parallel Distrib. Syst. 25:1 (2014), 212–221.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.1 , pp. 212-221
    • Yuan, J.1    Yu, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.