메뉴 건너뛰기




Volumn , Issue , 2016, Pages 619-636

Oblivious multi-party machine learning on trusted processors

Author keywords

[No Author keywords available]

Indexed keywords

DATA ANALYTICS; DECISION TREES; FACTORIZATION; K-MEANS CLUSTERING; LARGE DATASET; MACHINE LEARNING; SUPPORT VECTOR MACHINES; TREES (MATHEMATICS);

EID: 85068879161     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (548)

References (71)
  • 5
  • 16
    • 84859414659 scopus 로고    scopus 로고
    • Decision forests: A unified framework for classification, regression, density estimation, manifold learning and semi-supervised learning
    • CRIMINISI, A., SHOTTON, J., AND KONUKOGLU, E. Decision forests: A unified framework for classification, regression, density estimation, manifold learning and semi-supervised learning. Foundations and Trends in Computer Graphics and Vision 7, 2-3 (2012).
    • (2012) Foundations and Trends in Computer Graphics and Vision , vol.7 , pp. 2-3
    • Criminisi, A.1    Shotton, J.2    Konukoglu, E.3
  • 20
    • 85076457282 scopus 로고    scopus 로고
    • accessed 17/02/2016
    • Fast CNN library. http://fastcnn.codeplex.com/ (accessed 17/02/2016).
    • Fast CNN Library
  • 25
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • GOLDREICH, O., AND OSTROVSKY, R. Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM) 43, 3 (1996).
    • (1996) Journal of the ACM (JACM) , vol.43 , pp. 3
    • Goldreich, O.1    Ostrovsky, R.2
  • 32
    • 85008044987 scopus 로고    scopus 로고
    • Matrix factorization techniques for recommender systems
    • KOREN, Y., BELL, R., AND VOLINSKY, C. Matrix factorization techniques for recommender systems. Computer, 8 (2009).
    • (2009) Computer , vol.8
    • Koren, Y.1    Bell, R.2    Volinsky, C.3
  • 36
    • 70350390430 scopus 로고    scopus 로고
    • Secure multiparty computation for privacy-preserving data mining
    • LINDELL, Y., AND PINKAS, B. Secure multiparty computation for privacy-preserving data mining. IACR Cryptology ePrint Archive (2008).
    • (2008) IACR Cryptology ePrint Archive
    • Lindell, Y.1    Pinkas, B.2
  • 51
    • 33744584654 scopus 로고
    • Induction of decision trees
    • QUINLAN, J. R. Induction of decision trees. Machine Learning 1, 1 (1986).
    • (1986) Machine Learning , vol.1 , pp. 1
    • Quinlan, J.R.1
  • 53
    • 85076285042 scopus 로고    scopus 로고
    • Raccoon: Closing digital side-channels through obfuscated execution
    • RANE, A., LIN, C., AND TIWARI, M. Raccoon: Closing digital side-channels through obfuscated execution. In USENIX Security Symposium (2015).
    • (2015) USENIX Security Symposium
    • Rane, A.1    Lin, C.2    Tiwari, M.3
  • 55
  • 67
    • 0006472145 scopus 로고    scopus 로고
    • Support vector machines for multi-class pattern recognition
    • WESTON, J., AND WATKINS, C. Support vector machines for multi-class pattern recognition. In ESANN (1999).
    • (1999) ESANN
    • Weston, J.1    Watkins, C.2
  • 70
    • 84945197313 scopus 로고    scopus 로고
    • Controlled-channel attacks: Deterministic side channels for untrusted operating systems
    • XU, Y., CUI, W., AND PEINADO, M. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In IEEE Symposium on Security and Privacy (S&P) (2015).
    • (2015) IEEE Symposium on Security and Privacy (S&P)
    • Xu, Y.1    Cui, W.2    Peinado, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.