Machine learning classification over encrypted data
Abstract Machine learning classification is used in numerous settings nowadays, such as
medical or genomics predictions, spam detection, face recognition, and financial predictions …
medical or genomics predictions, spam detection, face recognition, and financial predictions …
A survey of multiple classifier systems as hybrid systems
A current focus of intense research in pattern classification is the combination of several
classifier systems, which can be built following either the same or different models and/or …
classifier systems, which can be built following either the same or different models and/or …
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
BK Samanthula, Y Elmehdwi… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Data Mining has wide applications in many areas such as banking, medicine, scientific
research and among government agencies. Classification is one of the commonly used …
research and among government agencies. Classification is one of the commonly used …
Sharing privacy-sensitive access to neuroimaging and genetics data: a review and preliminary validation
The growth of data sharing initiatives for neuroimaging and genomics represents an exciting
opportunity to confront the “small N” problem that plagues contemporary neuroimaging …
opportunity to confront the “small N” problem that plagues contemporary neuroimaging …
Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud
Computation outsourcing to the cloud has become a popular application in the age of cloud
computing. This computing paradigm brings in some new security concerns and challenges …
computing. This computing paradigm brings in some new security concerns and challenges …
Cloud computing service: The caseof large matrix determinant computation
Cloud computing paradigm provides an alternative and economical service for resource-
constrained clients to perform large-scale data computation. Since large matrix determinant …
constrained clients to perform large-scale data computation. Since large matrix determinant …
A zero-knowledge protocol for nuclear warhead verification
The verification of nuclear warheads for arms control involves a paradox: international
inspectors will have to gain high confidence in the authenticity of submitted items while …
inspectors will have to gain high confidence in the authenticity of submitted items while …
An evaluation framework for privacy-preserving record linkage
D Vatsalan, P Christen… - … of Privacy and …, 2014 - journalprivacyconfidentiality.org
Privacy-preserving record linkage (PPRL) addresses the problem of identifying matching
records from different databases that correspond to the same real-world entities using quasi …
records from different databases that correspond to the same real-world entities using quasi …
Secure similar document detection with simhash
S Buyrukbilen, S Bakiras - … Data Management: 10th VLDB Workshop, SDM …, 2014 - Springer
Similar document detection is a well-studied problem with important application domains,
such as plagiarism detection, document archiving, and patent/copyright protection. Recently …
such as plagiarism detection, document archiving, and patent/copyright protection. Recently …
State estimation using an extended Kalman filter with privacy-protected observed inputs
FJ Gonzalez-Serrano, A Amor-Martın… - … and security (WIFS), 2014 - ieeexplore.ieee.org
In this paper, we focus on the parameter estimation of dynamic state-space models using
privacy-protected data. We consider an scenario with two parties: on one side, the data …
privacy-protected data. We consider an scenario with two parties: on one side, the data …