Privacy-preserving decision trees training and prediction
A Akavia, M Leibovich, YS Resheff, R Ron… - ACM Transactions on …, 2022 - dl.acm.org
In the era of cloud computing and machine learning, data has become a highly valuable
resource. Recent history has shown that the benefits brought forth by this data driven culture …
resource. Recent history has shown that the benefits brought forth by this data driven culture …
Large-precision homomorphic sign evaluation using FHEW/TFHE bootstrapping
A comparison of two encrypted numbers is an important operation needed in many machine
learning applications, for example, decision tree or neural network inference/training. An …
learning applications, for example, decision tree or neural network inference/training. An …
Remark on the security of ckks scheme in practice
Abstract Recently, Li and Micciancio (ePrint 2020/1533) have proposed a passive attack on
the CKKS approximate homomorphic encryption (HE) scheme, which allows an adversary to …
the CKKS approximate homomorphic encryption (HE) scheme, which allows an adversary to …
Privacy-preserving and verifiable cloud-aided disease diagnosis and prediction with hyperplane decision-based classifier
Y Shao, C Tian, L Han, H Xian… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With the vigorous development and gradual maturity of machine learning (ML) technologies,
the AI-assisted disease diagnosis and prediction () system has been extensively studied and …
the AI-assisted disease diagnosis and prediction () system has been extensively studied and …
Polymath: Low-latency mpc via secure polynomial evaluations and its applications
While the practicality of secure multi-party computation (MPC) has been extensively
analyzed and improved over the past decade, we are hitting the limits of efficiency with the …
analyzed and improved over the past decade, we are hitting the limits of efficiency with the …
SoK: Privacy-preserving collaborative tree-based model learning
S Chatel, A Pyrgelis, JR Troncoso-Pastoriza… - arXiv preprint arXiv …, 2021 - arxiv.org
Tree-based models are among the most efficient machine learning techniques for data
mining nowadays due to their accuracy, interpretability, and simplicity. The recent …
mining nowadays due to their accuracy, interpretability, and simplicity. The recent …
Achievable CCA2 relaxation for homomorphic encryption
Homomorphic encryption (HE) protects data in-use, but can be computationally expensive.
To avoid the costly bootstrapping procedure that refreshes ciphertexts, some works have …
To avoid the costly bootstrapping procedure that refreshes ciphertexts, some works have …
Contemporary trends in privacy-preserving data pattern recognition
S Zapechnikov - Procedia Computer Science, 2021 - Elsevier
The article is devoted to the recent scientific problem of privacy-preserving data pattern
recognition. The purposes of the work are to systematize the security models for such tasks …
recognition. The purposes of the work are to systematize the security models for such tasks …
Модели и алгоритмы конфиденциального машинного обучения
СВ Запечников - Безопасность информационных технологий, 2020 - elibrary.ru
Статья посвящена недавно возникшей научной проблеме обеспечения
конфиденциальности в машинном обучении. Актуальность проблемы определяется …
конфиденциальности в машинном обучении. Актуальность проблемы определяется …
Enclavetree: Privacy-preserving data stream training and inference using tee
The classification service over a stream of data is becoming an important offering for cloud
providers, but users may encounter obstacles in providing sensitive data due to privacy …
providers, but users may encounter obstacles in providing sensitive data due to privacy …