A secure clinical diagnosis with privacy-preserving multiclass support vector machine in clouds
M Zhang, W Song, J Zhang - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
With the rapid growth of machine learning and artificial intelligence in medical cloud
systems, cloud-aided medical computing has materialized a concrete platform for rapid …
systems, cloud-aided medical computing has materialized a concrete platform for rapid …
Outsourceable two-party privacy-preserving biometric authentication
Biometric authentication, a key component for many secure protocols and applications, is a
process of authenticating a user by matching her biometric data against a biometric …
process of authenticating a user by matching her biometric data against a biometric …
An efficient and probabilistic secure bit-decomposition
BKK Samanthula, H Chun, W Jiang - … of the 8th ACM SIGSAC symposium …, 2013 - dl.acm.org
Many secure data analysis tasks, such as secure clustering and classification, require
efficient mechanisms to convert the intermediate encrypted integers into the corresponding …
efficient mechanisms to convert the intermediate encrypted integers into the corresponding …
Secure multiset intersection cardinality and its application to jaccard coefficient
BK Samanthula, W Jiang - IEEE Transactions on Dependable …, 2015 - ieeexplore.ieee.org
The Jaccard Coefficient, as an information similarity measure, has wide variety of
applications, such as cluster analysis and image segmentation. Due to the concerns of …
applications, such as cluster analysis and image segmentation. Due to the concerns of …
Near-pri: Private, proximity based location sharing
As the ubiquity of smartphones increases we see an increase in the popularity of location
based services. Specifically, online social networks provide services such as alerting the …
based services. Specifically, online social networks provide services such as alerting the …
p2Detect: Electricity Theft Detection With Privacy Preservation for Both Data and Model in Smart Grid
Electricity Theft Detection (ETD) based on deep learning can detect abnormal electricity
consumption behaviors by analyzing user historical data. However, existing ETD schemes …
consumption behaviors by analyzing user historical data. However, existing ETD schemes …
An efficient secure interval test protocol for small integers
Q Hu, H Ye, F Li, C Feng - Journal of Information Security and Applications, 2024 - Elsevier
The interval test problem is a variant of Yao's millionaires' problem to check whether a value
x belongs to an interval R. Existing solutions to the interval test problem prioritize generic …
x belongs to an interval R. Existing solutions to the interval test problem prioritize generic …
Privacy-preserving power usage and supply control in smart grid
H Chun, K Ren, W Jiang - Computers & Security, 2018 - Elsevier
In a cyber-physical system, the control component plays an essential role to make the cyber
and physical components work harmoniously together. When information collected from the …
and physical components work harmoniously together. When information collected from the …
A taxonomy of secure two-party comparison protocols and efficient constructions
N Attrapadung, G Hanaoka, S Kiyomoto… - … on Fundamentals of …, 2019 - search.ieice.org
Secure two-party comparison plays a crucial role in many privacy-preserving applications,
such as privacy-preserving data mining and machine learning. In particular, the available …
such as privacy-preserving data mining and machine learning. In particular, the available …
[PDF][PDF] 高效保密的参数区间估计
陈明艳, 成雯, 窦家维 - Journal of Cryptologic Research, 2020 - jcr.cacrnet.org.cn
信息技术的飞速发展, 一方面使我们获取信息的手段越来越多, 另一方面也极易导致隐私信息
泄露, 使隐私保护面临严峻的挑战. 安全多方计算已经成为联合计算中保护隐私的核心技术 …
泄露, 使隐私保护面临严峻的挑战. 安全多方计算已经成为联合计算中保护隐私的核心技术 …