A secure clinical diagnosis with privacy-preserving multiclass support vector machine in clouds

M Zhang, W Song, J Zhang - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
With the rapid growth of machine learning and artificial intelligence in medical cloud
systems, cloud-aided medical computing has materialized a concrete platform for rapid …

Outsourceable two-party privacy-preserving biometric authentication

H Chun, Y Elmehdwi, F Li, P Bhattacharya… - Proceedings of the 9th …, 2014 - dl.acm.org
Biometric authentication, a key component for many secure protocols and applications, is a
process of authenticating a user by matching her biometric data against a biometric …

An efficient and probabilistic secure bit-decomposition

BKK Samanthula, H Chun, W Jiang - … of the 8th ACM SIGSAC symposium …, 2013 - dl.acm.org
Many secure data analysis tasks, such as secure clustering and classification, require
efficient mechanisms to convert the intermediate encrypted integers into the corresponding …

Secure multiset intersection cardinality and its application to jaccard coefficient

BK Samanthula, W Jiang - IEEE Transactions on Dependable …, 2015 - ieeexplore.ieee.org
The Jaccard Coefficient, as an information similarity measure, has wide variety of
applications, such as cluster analysis and image segmentation. Due to the concerns of …

Near-pri: Private, proximity based location sharing

E Novak, Q Li - IEEE INFOCOM 2014-IEEE Conference on …, 2014 - ieeexplore.ieee.org
As the ubiquity of smartphones increases we see an increase in the popularity of location
based services. Specifically, online social networks provide services such as alerting the …

p2Detect: Electricity Theft Detection With Privacy Preservation for Both Data and Model in Smart Grid

L Wu, H Shi, S Fu, Y Luo, M Xu - IEEE Transactions on Smart …, 2022 - ieeexplore.ieee.org
Electricity Theft Detection (ETD) based on deep learning can detect abnormal electricity
consumption behaviors by analyzing user historical data. However, existing ETD schemes …

An efficient secure interval test protocol for small integers

Q Hu, H Ye, F Li, C Feng - Journal of Information Security and Applications, 2024 - Elsevier
The interval test problem is a variant of Yao's millionaires' problem to check whether a value
x belongs to an interval R. Existing solutions to the interval test problem prioritize generic …

Privacy-preserving power usage and supply control in smart grid

H Chun, K Ren, W Jiang - Computers & Security, 2018 - Elsevier
In a cyber-physical system, the control component plays an essential role to make the cyber
and physical components work harmoniously together. When information collected from the …

A taxonomy of secure two-party comparison protocols and efficient constructions

N Attrapadung, G Hanaoka, S Kiyomoto… - … on Fundamentals of …, 2019 - search.ieice.org
Secure two-party comparison plays a crucial role in many privacy-preserving applications,
such as privacy-preserving data mining and machine learning. In particular, the available …

[PDF][PDF] 高效保密的参数区间估计

陈明艳, 成雯, 窦家维 - Journal of Cryptologic Research, 2020 - jcr.cacrnet.org.cn
信息技术的飞速发展, 一方面使我们获取信息的手段越来越多, 另一方面也极易导致隐私信息
泄露, 使隐私保护面临严峻的挑战. 安全多方计算已经成为联合计算中保护隐私的核心技术 …