Machine learning classification over encrypted data

R Bost, RA Popa, S Tu, S Goldwasser - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Abstract Machine learning classification is used in numerous settings nowadays, such as
medical or genomics predictions, spam detection, face recognition, and financial predictions …

A survey of multiple classifier systems as hybrid systems

M Woźniak, M Grana, E Corchado - Information Fusion, 2014 - Elsevier
A current focus of intense research in pattern classification is the combination of several
classifier systems, which can be built following either the same or different models and/or …

k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

BK Samanthula, Y Elmehdwi… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Data Mining has wide applications in many areas such as banking, medicine, scientific
research and among government agencies. Classification is one of the commonly used …

Sharing privacy-sensitive access to neuroimaging and genetics data: a review and preliminary validation

AD Sarwate, SM Plis, JA Turner… - Frontiers in …, 2014 - frontiersin.org
The growth of data sharing initiatives for neuroimaging and genomics represents an exciting
opportunity to confront the “small N” problem that plagues contemporary neuroimaging …

Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud

X Lei, X Liao, T Huang, F Heriniaina - Information sciences, 2014 - Elsevier
Computation outsourcing to the cloud has become a popular application in the age of cloud
computing. This computing paradigm brings in some new security concerns and challenges …

Cloud computing service: The caseof large matrix determinant computation

X Lei, X Liao, T Huang, H Li - IEEE Transactions on Services …, 2014 - ieeexplore.ieee.org
Cloud computing paradigm provides an alternative and economical service for resource-
constrained clients to perform large-scale data computation. Since large matrix determinant …

A zero-knowledge protocol for nuclear warhead verification

A Glaser, B Barak, RJ Goldston - Nature, 2014 - nature.com
The verification of nuclear warheads for arms control involves a paradox: international
inspectors will have to gain high confidence in the authenticity of submitted items while …

An evaluation framework for privacy-preserving record linkage

D Vatsalan, P Christen… - … of Privacy and …, 2014 - journalprivacyconfidentiality.org
Privacy-preserving record linkage (PPRL) addresses the problem of identifying matching
records from different databases that correspond to the same real-world entities using quasi …

Secure similar document detection with simhash

S Buyrukbilen, S Bakiras - … Data Management: 10th VLDB Workshop, SDM …, 2014 - Springer
Similar document detection is a well-studied problem with important application domains,
such as plagiarism detection, document archiving, and patent/copyright protection. Recently …

State estimation using an extended Kalman filter with privacy-protected observed inputs

FJ Gonzalez-Serrano, A Amor-Martın… - … and security (WIFS), 2014 - ieeexplore.ieee.org
In this paper, we focus on the parameter estimation of dynamic state-space models using
privacy-protected data. We consider an scenario with two parties: on one side, the data …