-
1
-
-
84995527907
-
Deep learning with differential privacy
-
Abadi M, Chu A, Goodfellow I, McMahan H, Mironov I, Talwar K, Zhang L (2016) Deep learning with differential privacy. In: Proceedings of 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 308–318
-
(2016)
Proceedings of 2016 ACM SIGSAC Conference on Computer and Communications Security
, pp. 308-318
-
-
Abadi, M.1
Chu, A.2
Goodfellow, I.3
McMahan, H.4
Mironov, I.5
Talwar, K.6
Zhang, L.7
-
2
-
-
84985975976
-
Data set to grow 10-fold by 2020 as internet of things takes off
-
Adshead A (2014) Data set to grow 10-fold by 2020 as internet of things takes off. ComputerWeekly.com, 9
-
(2014)
Computerweekly.Com
, pp. 9
-
-
Adshead, A.1
-
3
-
-
85014856757
-
Multi-cloud data management using Shamir’s secret sharing and quantum byzantine agreement schemes
-
AlZain M, Li A, Soh B, Pardede E (2015) Multi-cloud data management using Shamir’s secret sharing and quantum byzantine agreement schemes. Int J Cloud Appl Comput 5(3):35–52
-
(2015)
Int J Cloud Appl Comput
, vol.5
, Issue.3
, pp. 35-52
-
-
AlZain, M.1
Li, A.2
Soh, B.3
Pardede, E.4
-
5
-
-
79251640709
-
Privacy preserving back-propagation neural network learning over arbitrarily partitioned data
-
Bansal A, Chen T, Zhong S (2001) Privacy preserving back-propagation neural network learning over arbitrarily partitioned data. Neural Comput Appl 20(1):143–150
-
(2001)
Neural Comput Appl
, vol.20
, Issue.1
, pp. 143-150
-
-
Bansal, A.1
Chen, T.2
Zhong, S.3
-
6
-
-
85018687758
-
A novel approach to defend multimedia flash crowd in cloud environment
-
Bhushan K, Gupta B (2018) A novel approach to defend multimedia flash crowd in cloud environment. Multimed Tools Appl 77(4):4609–4639
-
(2018)
Multimed Tools Appl
, vol.77
, Issue.4
, pp. 4609-4639
-
-
Bhushan, K.1
Gupta, B.2
-
7
-
-
85028434870
-
Feature interaction augmented sparse learning for fast kinect motion detection
-
Chang X, Ma Z, Lin M, Yang Y, Hauptmann A (2017) Feature interaction augmented sparse learning for fast kinect motion detection. IEEE Trans Image Process 26(8):3911–3920
-
(2017)
IEEE Trans Image Process
, vol.26
, Issue.8
, pp. 3911-3920
-
-
Chang, X.1
Ma, Z.2
Lin, M.3
Yang, Y.4
Hauptmann, A.5
-
8
-
-
85018496108
-
Bi-level semantic representation analysis for multimedia event detection
-
Chang X, Ma Z, Yang Y, Zeng Z, Hauptmann A (2017) Bi-level semantic representation analysis for multimedia event detection. IEEE Trans Cybern 47(5):1180–1197
-
(2017)
IEEE Trans Cybern
, vol.47
, Issue.5
, pp. 1180-1197
-
-
Chang, X.1
Ma, Z.2
Yang, Y.3
Zeng, Z.4
Hauptmann, A.5
-
9
-
-
84978974837
-
Semisupervised feature analysis by mining correlations among multiple tasks
-
Chang X, Yang Y (2017) Semisupervised feature analysis by mining correlations among multiple tasks. IEEE Trans Neural Netw Learn Syst 28(10):2294–2305
-
(2017)
IEEE Trans Neural Netw Learn Syst
, vol.28
, Issue.10
, pp. 2294-2305
-
-
Chang, X.1
Yang, Y.2
-
10
-
-
85015732763
-
Semantic pooling for complex event analysis in untrimmed videos
-
Chang X, Yu Y, Yang Y, Xing E (2017) Semantic pooling for complex event analysis in untrimmed videos. IEEE Trans Pattern Anal Mach Intell 39(8):1617–1632
-
(2017)
IEEE Trans Pattern Anal Mach Intell
, vol.39
, Issue.8
, pp. 1617-1632
-
-
Chang, X.1
Yu, Y.2
Yang, Y.3
Xing, E.4
-
11
-
-
70350345197
-
Privacy-preserving backpropagation neural network learning
-
Chen T, Zhong S (2009) Privacy-preserving backpropagation neural network learning. IEEE Trans Neural Netw 20(10):1554–1564
-
(2009)
IEEE Trans Neural Netw
, vol.20
, Issue.10
, pp. 1554-1564
-
-
Chen, T.1
Zhong, S.2
-
12
-
-
84987657487
-
Verifiable computation over large database with incremental updates
-
Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184–3195
-
(2016)
IEEE Trans Comput
, vol.65
, Issue.10
, pp. 3184-3195
-
-
Chen, X.1
Li, J.2
Weng, J.3
Ma, J.4
Lou, W.5
-
13
-
-
84962022357
-
New publicly verifiable databases with efficient updates
-
Chen X, Li J, Huang X, Ma J, Lou W (2015) New publicly verifiable databases with efficient updates. IEEE Trans Dependable Sec Comput 12(5):546–556
-
(2015)
IEEE Trans Dependable Sec Comput
, vol.12
, Issue.5
, pp. 546-556
-
-
Chen, X.1
Li, J.2
Huang, X.3
Ma, J.4
Lou, W.5
-
14
-
-
84916890442
-
New algorithms for secure outsourcing of large-scale systems of linear equations
-
Chen X, Huang X, Li J, Ma J, Lou W, Wong D (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans Inf Forensics Secur 10(1):69–78
-
(2015)
IEEE Trans Inf Forensics Secur
, vol.10
, Issue.1
, pp. 69-78
-
-
Chen, X.1
Huang, X.2
Li, J.3
Ma, J.4
Lou, W.5
Wong, D.6
-
15
-
-
84906242615
-
New algorithms for secure outsourcing of modular exponentiations
-
Chen X, Li J, Ma J, Tang Q, Lou W (2014) New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Paral Distr Syst 25(9):2386–2396
-
(2014)
IEEE Trans Paral Distr Syst
, vol.25
, Issue.9
, pp. 2386-2396
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
16
-
-
84893719831
-
Identity-based chameleon hashing and signatures without key exposure
-
Chen X, Zhang F, Susilo W, Tian H, Li J, Kim K (2014) Identity-based chameleon hashing and signatures without key exposure. Inf Sci 265:198–210
-
(2014)
Inf Sci
, vol.265
, pp. 198-210
-
-
Chen, X.1
Zhang, F.2
Susilo, W.3
Tian, H.4
Li, J.5
Kim, K.6
-
17
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu M (2002) Tools for privacy preserving distributed data mining. Sigkdd Explor Newsl 4(2):28–34
-
(2002)
Sigkdd Explor Newsl
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.5
-
19
-
-
85042177781
-
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
-
Gao CZ, Cheng Q, Li X, Xia SB (2018) Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Clust Comput. 10.1007/s10586-017-1649-y
-
(2018)
Clust Comput
-
-
Gao, C.Z.1
Cheng, Q.2
Li, X.3
Xia, S.B.4
-
20
-
-
85042844342
-
Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack
-
Gao CZ, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack. Inf Sci. 10.1016/j.ins.2018.02.058
-
(2018)
Inf Sci
-
-
Gao, C.Z.1
Cheng, Q.2
He, P.3
Susilo, W.4
Li, J.5
-
24
-
-
85044163771
-
Homomorphic encryption as a service for outsourced images in mobile cloud computing environment
-
Ibtihal M, Naanani H (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput 7(2):27–40
-
(2017)
Int J Cloud Appl Comput
, vol.7
, Issue.2
, pp. 27-40
-
-
Ibtihal, M.1
Naanani, H.2
-
25
-
-
85007079359
-
Secure and efficient cloud data deduplication with randomized tag
-
Jiang T, Chen X, Wu Q, Ma J, Susilo W, Lou W (2017) Secure and efficient cloud data deduplication with randomized tag. IEEE Trans Inf Foren Secur 12(3):532–543
-
(2017)
IEEE Trans Inf Foren Secur
, vol.12
, Issue.3
, pp. 532-543
-
-
Jiang, T.1
Chen, X.2
Wu, Q.3
Ma, J.4
Susilo, W.5
Lou, W.6
-
26
-
-
84978654857
-
Public integrity auditing for shared dynamic cloud data with group user revocation
-
Jiang T, Chen X, Ma J (2016) Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans Comput 65(8):2363–2373
-
(2016)
IEEE Trans Comput
, vol.65
, Issue.8
, pp. 2363-2373
-
-
Jiang, T.1
Chen, X.2
Ma, J.3
-
27
-
-
85040914381
-
Rumor source identification in social networks with time-varying topology
-
Jiang J, Wen S, Yu S, Xiang Y, Zhou W (2018) Rumor source identification in social networks with time-varying topology. IEEE Trans Dependable Sec Comput 15(1):166–179
-
(2018)
IEEE Trans Dependable Sec Comput
, vol.15
, Issue.1
, pp. 166-179
-
-
Jiang, J.1
Wen, S.2
Yu, S.3
Xiang, Y.4
Zhou, W.5
-
28
-
-
84902436467
-
Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud
-
Lei X, Liao X, Huang T, Heriniaina F (2014) Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf Sci 280:205–217
-
(2014)
Inf Sci
, vol.280
, pp. 205-217
-
-
Lei, X.1
Liao, X.2
Huang, T.3
Heriniaina, F.4
-
29
-
-
85020613543
-
Differential privacy: from theory to practice
-
Li N, Lyu M, Su D, Yang W (2016) Differential privacy: from theory to practice. Synth Lect Inf Secur Priv Trust 8(4):1–138
-
(2016)
Synth Lect Inf Secur Priv Trust
, vol.8
, Issue.4
, pp. 1-138
-
-
Li, N.1
Lyu, M.2
Su, D.3
Yang, W.4
-
30
-
-
84927584035
-
A Hybrid cloud approach for secure authorized deduplication
-
Li J, Li Y, Chen X, Lee P, Lou W (2015) A Hybrid cloud approach for secure authorized deduplication. IEEE Trans Paral Distr Syst 26(5):1206–1216
-
(2015)
IEEE Trans Paral Distr Syst
, vol.26
, Issue.5
, pp. 1206-1216
-
-
Li, J.1
Li, Y.2
Chen, X.3
Lee, P.4
Lou, W.5
-
31
-
-
84946905043
-
Secure distributed deduplication systems with improved reliability
-
Li J, Chen X, Huang X, Tang S, Xiang Y, Hassan M, Alelaiwi A (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569–3579
-
(2015)
IEEE Trans Comput
, vol.64
, Issue.12
, pp. 3569-3579
-
-
Li, J.1
Chen, X.2
Huang, X.3
Tang, S.4
Xiang, Y.5
Hassan, M.6
Alelaiwi, A.7
-
32
-
-
85028916868
-
Beyond trace ratio: weighted harmonic mean of trace ratios for multiclass discriminant analysis
-
Li Z, Nie F, Chang X, Yang Y (2017) Beyond trace ratio: weighted harmonic mean of trace ratios for multiclass discriminant analysis. IEEE Trans Knowl Data Eng 29(10):2100–2110
-
(2017)
IEEE Trans Knowl Data Eng
, vol.29
, Issue.10
, pp. 2100-2110
-
-
Li, Z.1
Nie, F.2
Chang, X.3
Yang, Y.4
-
33
-
-
85019024257
-
Guest editorial big security challenges in big data era
-
Li H, Lu R, Misic JV (2017) Guest editorial big security challenges in big data era. IEEE Internet Things J 4(2):521–523
-
(2017)
IEEE Internet Things J
, vol.4
, Issue.2
, pp. 521-523
-
-
Li, H.1
Lu, R.2
Misic, J.V.3
-
34
-
-
84973579525
-
Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
-
Li H, Yang Y, Luan TH, Liang X, Zhou L, Shen X (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Dependable Sec Comput 13(3):312–325
-
(2016)
IEEE Trans Dependable Sec Comput
, vol.13
, Issue.3
, pp. 312-325
-
-
Li, H.1
Yang, Y.2
Luan, T.H.3
Liang, X.4
Zhou, L.5
Shen, X.6
-
35
-
-
85042848600
-
Differentially private naive bayes learning over multiple data sources
-
Li T, Li J, Liu Z, Li P, Jia C (2018) Differentially private naive bayes learning over multiple data sources. Inf Sci 444:89–104
-
(2018)
Inf Sci
, vol.444
, pp. 89-104
-
-
Li, T.1
Li, J.2
Liu, Z.3
Li, P.4
Jia, C.5
-
36
-
-
85018906248
-
Multi-key privacy-preserving deep learning in cloud computing
-
Li P, Li J, Huang Z, Li T, Gao CZ, Yiu SM, Chen K (2017) Multi-key privacy-preserving deep learning in cloud computing. Future Gener Comput Syst 74:76–85
-
(2017)
Future Gener Comput Syst
, vol.74
, pp. 76-85
-
-
Li, P.1
Li, J.2
Huang, Z.3
Li, T.4
Gao, C.Z.5
Yiu, S.M.6
Chen, K.7
-
37
-
-
85042715169
-
An ID-based linearly homomorphic signature scheme and its application in blockchain
-
Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018) An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access. 10.1109/ACCESS.2018.2809426
-
(2018)
IEEE Access
-
-
Lin, Q.1
Yan, H.2
Huang, Z.3
Chen, W.4
Shen, J.5
Tang, Y.6
-
42
-
-
84881255209
-
Privacy-preserving ridge regression on hundreds of millions of records
-
Nikolaenko V, Weinsberg U, Ioannidis S, Joye M, Boneh D, Taft N (2013) Privacy-preserving ridge regression on hundreds of millions of records. In: Proceedings of the Security and Privacy, pp 334–348
-
(2013)
Proceedings of the Security and Privacy
, pp. 334-348
-
-
Nikolaenko, V.1
Weinsberg, U.2
Ioannidis, S.3
Joye, M.4
Boneh, D.5
Taft, N.6
-
43
-
-
85068879161
-
Oblivious multi-party machine learning on trusted processors
-
Ohrimenko O, Schuster F, Fournet C, Mehta A, Nowozin S, Vaswani K, Costa M (2016) Oblivious multi-party machine learning on trusted processors. In: USENIX Security Symposium, pp 619–636
-
(2016)
USENIX Security Symposium
, pp. 619-636
-
-
Ohrimenko, O.1
Schuster, F.2
Fournet, C.3
Mehta, A.4
Nowozin, S.5
Vaswani, K.6
Costa, M.7
-
44
-
-
0025482216
-
Performance surfaces of a single-layer perceptron
-
Shynk J (1990) Performance surfaces of a single-layer perceptron. IEEE Trans Neural Netw 1:268–274
-
(1990)
IEEE Trans Neural Netw
, vol.1
, pp. 268-274
-
-
Shynk, J.1
-
45
-
-
85029534077
-
Privacy-Preserving Decision Trees Evaluation via Linear Functions
-
Springer International Publishing, Cham
-
Tai R, Ma J, Zhao Y, Chow S (2017) Privacy-preserving decision trees evaluation via linear functions. In: Proceedings of European Symposium on Research in Computer Security, pp 494–512
-
(2017)
Computer Security – ESORICS 2017
, pp. 494-512
-
-
Tai, R.K.H.1
Ma, J.P.K.2
Zhao, Y.3
Chow, S.S.M.4
-
47
-
-
84960539113
-
Verifiable auditing for outsourced database in cloud computing
-
Wang J, Chen X, Huang X, You I, Xiang Y (2015) Verifiable auditing for outsourced database in cloud computing. IEEE Trans Comput 64(11):3293–3303
-
(2015)
IEEE Trans Comput
, vol.64
, Issue.11
, pp. 3293-3303
-
-
Wang, J.1
Chen, X.2
Huang, X.3
You, I.4
Xiang, Y.5
-
48
-
-
84910602883
-
To shut them up or to clarify: restraining the spread of rumors in online social networks
-
Wen S, Jiang J, Xiang Y, Yu S, Zhou W, Jia W (2014) To shut them up or to clarify: restraining the spread of rumors in online social networks. IEEE Trans Parallel Distrib Syst 25(12):3306–3316
-
(2014)
IEEE Trans Parallel Distrib Syst
, vol.25
, Issue.12
, pp. 3306-3316
-
-
Wen, S.1
Jiang, J.2
Xiang, Y.3
Yu, S.4
Zhou, W.5
Jia, W.6
-
49
-
-
42749083487
-
A comparative study for content-based dynamic spam classification using four machine learning algorithms
-
Yu B, Xu Z (2008) A comparative study for content-based dynamic spam classification using four machine learning algorithms. Knowl Based Syst 21(4):355–362
-
(2008)
Knowl Based Syst
, vol.21
, Issue.4
, pp. 355-362
-
-
Yu, B.1
Xu, Z.2
-
50
-
-
36148959733
-
Credit risk assessment with a multistage neural network ensemble learning approach
-
Yu L, Wang S, Lai K (2008) Credit risk assessment with a multistage neural network ensemble learning approach. Expert Syst Appl 34(2):1434–1444
-
(2008)
Expert Syst Appl
, vol.34
, Issue.2
, pp. 1434-1444
-
-
Yu, L.1
Wang, S.2
Lai, K.3
-
51
-
-
85029543737
-
PPDP: an efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system
-
Zhang C, Zhu L, Xu C, Lu R (2018) PPDP: an efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system. Future Gener Comput Syst 79:16–25
-
(2018)
Future Gener Comput Syst
, vol.79
, pp. 16-25
-
-
Zhang, C.1
Zhu, L.2
Xu, C.3
Lu, R.4
-
52
-
-
85020567479
-
Dynamic differential privacy for ADMM-based distributed classification learning
-
Zhang T, Zhu Q (2017) Dynamic differential privacy for ADMM-based distributed classification learning. IEEE Trans Inf Foren Secur 12(1):172–187
-
(2017)
IEEE Trans Inf Foren Secur
, vol.12
, Issue.1
, pp. 172-187
-
-
Zhang, T.1
Zhu, Q.2
-
53
-
-
85019179676
-
New Publicly Verifiable Computation for Batch Matrix Multiplication
-
Springer International Publishing, Cham
-
Zhang X, Jiang T, Li KC, Chen X (2017) New publicly verifiable computation for batch matrix multiplication. In: Proceedings of the GPC’17, pp 53–65
-
(2017)
Green, Pervasive, and Cloud Computing
, pp. 53-65
-
-
Zhang, X.1
Jiang, T.2
Li, K.-C.3
Chen, X.4
-
54
-
-
85037050338
-
New publicly verifiable computation for batch matrix multiplication
-
Zhang X, Jiang T, Li KC, Castiglione A, Chen X (2017) New publicly verifiable computation for batch matrix multiplication. Inf Sci. 10.1016/j.ins.2017.11.063
-
(2017)
Inf Sci
-
-
Zhang, X.1
Jiang, T.2
Li, K.C.3
Castiglione, A.4
Chen, X.5
-
55
-
-
85035763217
-
A lightweight authentication encryption based on chaotic SCML for railway cloud service
-
Zheng Q, Wang X, Khan M, Zhang W, Gupta B, Guo W (2017) A lightweight authentication encryption based on chaotic SCML for railway cloud service. IEEE Access 6:711–722
-
(2017)
IEEE Access
, vol.6
, pp. 711-722
-
-
Zheng, Q.1
Wang, X.2
Khan, M.3
Zhang, W.4
Gupta, B.5
Guo, W.6
|