메뉴 건너뛰기




Volumn 22, Issue 23, 2018, Pages 7719-7732

Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing

Author keywords

Batch training; Cloud computing; Privacy preservation; Single layer perceptron; Verifiability

Indexed keywords

ARTIFICIAL INTELLIGENCE; CLOUD COMPUTING; IMAGE PROCESSING; LEARNING SYSTEMS; OUTSOURCING; PATTERN RECOGNITION;

EID: 85047134011     PISSN: 14327643     EISSN: 14337479     Source Type: Journal    
DOI: 10.1007/s00500-018-3233-7     Document Type: Article
Times cited : (29)

References (55)
  • 2
    • 84985975976 scopus 로고    scopus 로고
    • Data set to grow 10-fold by 2020 as internet of things takes off
    • Adshead A (2014) Data set to grow 10-fold by 2020 as internet of things takes off. ComputerWeekly.com, 9
    • (2014) Computerweekly.Com , pp. 9
    • Adshead, A.1
  • 3
    • 85014856757 scopus 로고    scopus 로고
    • Multi-cloud data management using Shamir’s secret sharing and quantum byzantine agreement schemes
    • AlZain M, Li A, Soh B, Pardede E (2015) Multi-cloud data management using Shamir’s secret sharing and quantum byzantine agreement schemes. Int J Cloud Appl Comput 5(3):35–52
    • (2015) Int J Cloud Appl Comput , vol.5 , Issue.3 , pp. 35-52
    • AlZain, M.1    Li, A.2    Soh, B.3    Pardede, E.4
  • 5
    • 79251640709 scopus 로고    scopus 로고
    • Privacy preserving back-propagation neural network learning over arbitrarily partitioned data
    • Bansal A, Chen T, Zhong S (2001) Privacy preserving back-propagation neural network learning over arbitrarily partitioned data. Neural Comput Appl 20(1):143–150
    • (2001) Neural Comput Appl , vol.20 , Issue.1 , pp. 143-150
    • Bansal, A.1    Chen, T.2    Zhong, S.3
  • 6
    • 85018687758 scopus 로고    scopus 로고
    • A novel approach to defend multimedia flash crowd in cloud environment
    • Bhushan K, Gupta B (2018) A novel approach to defend multimedia flash crowd in cloud environment. Multimed Tools Appl 77(4):4609–4639
    • (2018) Multimed Tools Appl , vol.77 , Issue.4 , pp. 4609-4639
    • Bhushan, K.1    Gupta, B.2
  • 7
    • 85028434870 scopus 로고    scopus 로고
    • Feature interaction augmented sparse learning for fast kinect motion detection
    • Chang X, Ma Z, Lin M, Yang Y, Hauptmann A (2017) Feature interaction augmented sparse learning for fast kinect motion detection. IEEE Trans Image Process 26(8):3911–3920
    • (2017) IEEE Trans Image Process , vol.26 , Issue.8 , pp. 3911-3920
    • Chang, X.1    Ma, Z.2    Lin, M.3    Yang, Y.4    Hauptmann, A.5
  • 8
    • 85018496108 scopus 로고    scopus 로고
    • Bi-level semantic representation analysis for multimedia event detection
    • Chang X, Ma Z, Yang Y, Zeng Z, Hauptmann A (2017) Bi-level semantic representation analysis for multimedia event detection. IEEE Trans Cybern 47(5):1180–1197
    • (2017) IEEE Trans Cybern , vol.47 , Issue.5 , pp. 1180-1197
    • Chang, X.1    Ma, Z.2    Yang, Y.3    Zeng, Z.4    Hauptmann, A.5
  • 9
    • 84978974837 scopus 로고    scopus 로고
    • Semisupervised feature analysis by mining correlations among multiple tasks
    • Chang X, Yang Y (2017) Semisupervised feature analysis by mining correlations among multiple tasks. IEEE Trans Neural Netw Learn Syst 28(10):2294–2305
    • (2017) IEEE Trans Neural Netw Learn Syst , vol.28 , Issue.10 , pp. 2294-2305
    • Chang, X.1    Yang, Y.2
  • 10
    • 85015732763 scopus 로고    scopus 로고
    • Semantic pooling for complex event analysis in untrimmed videos
    • Chang X, Yu Y, Yang Y, Xing E (2017) Semantic pooling for complex event analysis in untrimmed videos. IEEE Trans Pattern Anal Mach Intell 39(8):1617–1632
    • (2017) IEEE Trans Pattern Anal Mach Intell , vol.39 , Issue.8 , pp. 1617-1632
    • Chang, X.1    Yu, Y.2    Yang, Y.3    Xing, E.4
  • 11
    • 70350345197 scopus 로고    scopus 로고
    • Privacy-preserving backpropagation neural network learning
    • Chen T, Zhong S (2009) Privacy-preserving backpropagation neural network learning. IEEE Trans Neural Netw 20(10):1554–1564
    • (2009) IEEE Trans Neural Netw , vol.20 , Issue.10 , pp. 1554-1564
    • Chen, T.1    Zhong, S.2
  • 12
    • 84987657487 scopus 로고    scopus 로고
    • Verifiable computation over large database with incremental updates
    • Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184–3195
    • (2016) IEEE Trans Comput , vol.65 , Issue.10 , pp. 3184-3195
    • Chen, X.1    Li, J.2    Weng, J.3    Ma, J.4    Lou, W.5
  • 14
    • 84916890442 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of large-scale systems of linear equations
    • Chen X, Huang X, Li J, Ma J, Lou W, Wong D (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans Inf Forensics Secur 10(1):69–78
    • (2015) IEEE Trans Inf Forensics Secur , vol.10 , Issue.1 , pp. 69-78
    • Chen, X.1    Huang, X.2    Li, J.3    Ma, J.4    Lou, W.5    Wong, D.6
  • 15
    • 84906242615 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of modular exponentiations
    • Chen X, Li J, Ma J, Tang Q, Lou W (2014) New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Paral Distr Syst 25(9):2386–2396
    • (2014) IEEE Trans Paral Distr Syst , vol.25 , Issue.9 , pp. 2386-2396
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 16
    • 84893719831 scopus 로고    scopus 로고
    • Identity-based chameleon hashing and signatures without key exposure
    • Chen X, Zhang F, Susilo W, Tian H, Li J, Kim K (2014) Identity-based chameleon hashing and signatures without key exposure. Inf Sci 265:198–210
    • (2014) Inf Sci , vol.265 , pp. 198-210
    • Chen, X.1    Zhang, F.2    Susilo, W.3    Tian, H.4    Li, J.5    Kim, K.6
  • 19
    • 85042177781 scopus 로고    scopus 로고
    • Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
    • Gao CZ, Cheng Q, Li X, Xia SB (2018) Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Clust Comput. 10.1007/s10586-017-1649-y
    • (2018) Clust Comput
    • Gao, C.Z.1    Cheng, Q.2    Li, X.3    Xia, S.B.4
  • 20
    • 85042844342 scopus 로고    scopus 로고
    • Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack
    • Gao CZ, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack. Inf Sci. 10.1016/j.ins.2018.02.058
    • (2018) Inf Sci
    • Gao, C.Z.1    Cheng, Q.2    He, P.3    Susilo, W.4    Li, J.5
  • 24
    • 85044163771 scopus 로고    scopus 로고
    • Homomorphic encryption as a service for outsourced images in mobile cloud computing environment
    • Ibtihal M, Naanani H (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput 7(2):27–40
    • (2017) Int J Cloud Appl Comput , vol.7 , Issue.2 , pp. 27-40
    • Ibtihal, M.1    Naanani, H.2
  • 25
  • 26
    • 84978654857 scopus 로고    scopus 로고
    • Public integrity auditing for shared dynamic cloud data with group user revocation
    • Jiang T, Chen X, Ma J (2016) Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans Comput 65(8):2363–2373
    • (2016) IEEE Trans Comput , vol.65 , Issue.8 , pp. 2363-2373
    • Jiang, T.1    Chen, X.2    Ma, J.3
  • 27
    • 85040914381 scopus 로고    scopus 로고
    • Rumor source identification in social networks with time-varying topology
    • Jiang J, Wen S, Yu S, Xiang Y, Zhou W (2018) Rumor source identification in social networks with time-varying topology. IEEE Trans Dependable Sec Comput 15(1):166–179
    • (2018) IEEE Trans Dependable Sec Comput , vol.15 , Issue.1 , pp. 166-179
    • Jiang, J.1    Wen, S.2    Yu, S.3    Xiang, Y.4    Zhou, W.5
  • 28
    • 84902436467 scopus 로고    scopus 로고
    • Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud
    • Lei X, Liao X, Huang T, Heriniaina F (2014) Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf Sci 280:205–217
    • (2014) Inf Sci , vol.280 , pp. 205-217
    • Lei, X.1    Liao, X.2    Huang, T.3    Heriniaina, F.4
  • 30
    • 84927584035 scopus 로고    scopus 로고
    • A Hybrid cloud approach for secure authorized deduplication
    • Li J, Li Y, Chen X, Lee P, Lou W (2015) A Hybrid cloud approach for secure authorized deduplication. IEEE Trans Paral Distr Syst 26(5):1206–1216
    • (2015) IEEE Trans Paral Distr Syst , vol.26 , Issue.5 , pp. 1206-1216
    • Li, J.1    Li, Y.2    Chen, X.3    Lee, P.4    Lou, W.5
  • 32
    • 85028916868 scopus 로고    scopus 로고
    • Beyond trace ratio: weighted harmonic mean of trace ratios for multiclass discriminant analysis
    • Li Z, Nie F, Chang X, Yang Y (2017) Beyond trace ratio: weighted harmonic mean of trace ratios for multiclass discriminant analysis. IEEE Trans Knowl Data Eng 29(10):2100–2110
    • (2017) IEEE Trans Knowl Data Eng , vol.29 , Issue.10 , pp. 2100-2110
    • Li, Z.1    Nie, F.2    Chang, X.3    Yang, Y.4
  • 33
    • 85019024257 scopus 로고    scopus 로고
    • Guest editorial big security challenges in big data era
    • Li H, Lu R, Misic JV (2017) Guest editorial big security challenges in big data era. IEEE Internet Things J 4(2):521–523
    • (2017) IEEE Internet Things J , vol.4 , Issue.2 , pp. 521-523
    • Li, H.1    Lu, R.2    Misic, J.V.3
  • 34
    • 84973579525 scopus 로고    scopus 로고
    • Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
    • Li H, Yang Y, Luan TH, Liang X, Zhou L, Shen X (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Dependable Sec Comput 13(3):312–325
    • (2016) IEEE Trans Dependable Sec Comput , vol.13 , Issue.3 , pp. 312-325
    • Li, H.1    Yang, Y.2    Luan, T.H.3    Liang, X.4    Zhou, L.5    Shen, X.6
  • 35
    • 85042848600 scopus 로고    scopus 로고
    • Differentially private naive bayes learning over multiple data sources
    • Li T, Li J, Liu Z, Li P, Jia C (2018) Differentially private naive bayes learning over multiple data sources. Inf Sci 444:89–104
    • (2018) Inf Sci , vol.444 , pp. 89-104
    • Li, T.1    Li, J.2    Liu, Z.3    Li, P.4    Jia, C.5
  • 37
    • 85042715169 scopus 로고    scopus 로고
    • An ID-based linearly homomorphic signature scheme and its application in blockchain
    • Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018) An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access. 10.1109/ACCESS.2018.2809426
    • (2018) IEEE Access
    • Lin, Q.1    Yan, H.2    Huang, Z.3    Chen, W.4    Shen, J.5    Tang, Y.6
  • 44
    • 0025482216 scopus 로고
    • Performance surfaces of a single-layer perceptron
    • Shynk J (1990) Performance surfaces of a single-layer perceptron. IEEE Trans Neural Netw 1:268–274
    • (1990) IEEE Trans Neural Netw , vol.1 , pp. 268-274
    • Shynk, J.1
  • 45
    • 85029534077 scopus 로고    scopus 로고
    • Privacy-Preserving Decision Trees Evaluation via Linear Functions
    • Springer International Publishing, Cham
    • Tai R, Ma J, Zhao Y, Chow S (2017) Privacy-preserving decision trees evaluation via linear functions. In: Proceedings of European Symposium on Research in Computer Security, pp 494–512
    • (2017) Computer Security – ESORICS 2017 , pp. 494-512
    • Tai, R.K.H.1    Ma, J.P.K.2    Zhao, Y.3    Chow, S.S.M.4
  • 47
    • 84960539113 scopus 로고    scopus 로고
    • Verifiable auditing for outsourced database in cloud computing
    • Wang J, Chen X, Huang X, You I, Xiang Y (2015) Verifiable auditing for outsourced database in cloud computing. IEEE Trans Comput 64(11):3293–3303
    • (2015) IEEE Trans Comput , vol.64 , Issue.11 , pp. 3293-3303
    • Wang, J.1    Chen, X.2    Huang, X.3    You, I.4    Xiang, Y.5
  • 48
    • 84910602883 scopus 로고    scopus 로고
    • To shut them up or to clarify: restraining the spread of rumors in online social networks
    • Wen S, Jiang J, Xiang Y, Yu S, Zhou W, Jia W (2014) To shut them up or to clarify: restraining the spread of rumors in online social networks. IEEE Trans Parallel Distrib Syst 25(12):3306–3316
    • (2014) IEEE Trans Parallel Distrib Syst , vol.25 , Issue.12 , pp. 3306-3316
    • Wen, S.1    Jiang, J.2    Xiang, Y.3    Yu, S.4    Zhou, W.5    Jia, W.6
  • 49
    • 42749083487 scopus 로고    scopus 로고
    • A comparative study for content-based dynamic spam classification using four machine learning algorithms
    • Yu B, Xu Z (2008) A comparative study for content-based dynamic spam classification using four machine learning algorithms. Knowl Based Syst 21(4):355–362
    • (2008) Knowl Based Syst , vol.21 , Issue.4 , pp. 355-362
    • Yu, B.1    Xu, Z.2
  • 50
    • 36148959733 scopus 로고    scopus 로고
    • Credit risk assessment with a multistage neural network ensemble learning approach
    • Yu L, Wang S, Lai K (2008) Credit risk assessment with a multistage neural network ensemble learning approach. Expert Syst Appl 34(2):1434–1444
    • (2008) Expert Syst Appl , vol.34 , Issue.2 , pp. 1434-1444
    • Yu, L.1    Wang, S.2    Lai, K.3
  • 51
    • 85029543737 scopus 로고    scopus 로고
    • PPDP: an efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system
    • Zhang C, Zhu L, Xu C, Lu R (2018) PPDP: an efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system. Future Gener Comput Syst 79:16–25
    • (2018) Future Gener Comput Syst , vol.79 , pp. 16-25
    • Zhang, C.1    Zhu, L.2    Xu, C.3    Lu, R.4
  • 52
    • 85020567479 scopus 로고    scopus 로고
    • Dynamic differential privacy for ADMM-based distributed classification learning
    • Zhang T, Zhu Q (2017) Dynamic differential privacy for ADMM-based distributed classification learning. IEEE Trans Inf Foren Secur 12(1):172–187
    • (2017) IEEE Trans Inf Foren Secur , vol.12 , Issue.1 , pp. 172-187
    • Zhang, T.1    Zhu, Q.2
  • 53
    • 85019179676 scopus 로고    scopus 로고
    • New Publicly Verifiable Computation for Batch Matrix Multiplication
    • Springer International Publishing, Cham
    • Zhang X, Jiang T, Li KC, Chen X (2017) New publicly verifiable computation for batch matrix multiplication. In: Proceedings of the GPC’17, pp 53–65
    • (2017) Green, Pervasive, and Cloud Computing , pp. 53-65
    • Zhang, X.1    Jiang, T.2    Li, K.-C.3    Chen, X.4
  • 54
    • 85037050338 scopus 로고    scopus 로고
    • New publicly verifiable computation for batch matrix multiplication
    • Zhang X, Jiang T, Li KC, Castiglione A, Chen X (2017) New publicly verifiable computation for batch matrix multiplication. Inf Sci. 10.1016/j.ins.2017.11.063
    • (2017) Inf Sci
    • Zhang, X.1    Jiang, T.2    Li, K.C.3    Castiglione, A.4    Chen, X.5
  • 55
    • 85035763217 scopus 로고    scopus 로고
    • A lightweight authentication encryption based on chaotic SCML for railway cloud service
    • Zheng Q, Wang X, Khan M, Zhang W, Gupta B, Guo W (2017) A lightweight authentication encryption based on chaotic SCML for railway cloud service. IEEE Access 6:711–722
    • (2017) IEEE Access , vol.6 , pp. 711-722
    • Zheng, Q.1    Wang, X.2    Khan, M.3    Zhang, W.4    Gupta, B.5    Guo, W.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.