• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4605581)   Today's Articles (1)   Subscriber (49373)
For: Li J, Kuang X, Lin S, Ma X, Tang Y. Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.03.041] [Citation(s) in RCA: 22] [Impact Index Per Article: 5.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
Number Cited by Other Article(s)
1
Luo Q, Li H. Respecting Partial Privacy of Unstructured Data via Spectrum-Based Encoder. SENSORS (BASEL, SWITZERLAND) 2024;24:1015. [PMID: 38339730 PMCID: PMC10857643 DOI: 10.3390/s24031015] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/07/2023] [Revised: 02/01/2024] [Accepted: 02/02/2024] [Indexed: 02/12/2024]
2
Mohana S, Shyamala C, Rani ES, Ambika M. Preserving sensitive data with deep learning assisted sanitisation process. J EXP THEOR ARTIF IN 2022. [DOI: 10.1080/0952813x.2022.2149861] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/07/2022]
3
Xia Z, Yang Q, Qiao Z, Feng F. Quorum Controlled Homomorphic Re-encryption for Privacy Preserving Computations in the Cloud. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.11.084] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
4
Caruccio L, Desiato D, Polese G, Tortora G, Zannone N. A decision-support framework for data anonymization with application to machine learning processes. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.09.004] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
5
Yuan K, Huang Y, Li J, Jia C, Yu D. A Block Cipher Algorithm Identification Scheme Based on Hybrid Random Forest and Logistic Regression Model. Neural Process Lett 2022. [DOI: 10.1007/s11063-022-11005-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/15/2022]
6
Privacy-Preserving and Explainable AI in Industrial Applications. APPLIED SCIENCES-BASEL 2022. [DOI: 10.3390/app12136395] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]
7
Ji C, Zhu Z, Wang X, Zhai W, Zong X, Chen A, Zhou M. Task‐aware swapping for efficient DNN inference on DRAM‐constrained edge systems. INT J INTELL SYST 2022. [DOI: 10.1002/int.22933] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
8
Machine Learning for Healthcare Wearable Devices: The Big Picture. JOURNAL OF HEALTHCARE ENGINEERING 2022;2022:4653923. [PMID: 35480146 PMCID: PMC9038375 DOI: 10.1155/2022/4653923] [Citation(s) in RCA: 30] [Impact Index Per Article: 15.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/17/2021] [Accepted: 03/22/2022] [Indexed: 02/07/2023]
9
Qiu J. Ciphertext Database Audit Technology Under Searchable Encryption Algorithm and Blockchain Technology. JOURNAL OF GLOBAL INFORMATION MANAGEMENT 2022. [DOI: 10.4018/jgim.315014] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/05/2022]
10
Wang H, Peng X, Xiao Y, Xu Z, Chen X. Differentially private data aggregating with relative error constraint. COMPLEX INTELL SYST 2022. [DOI: 10.1007/s40747-021-00550-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
11
Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. ELECTRONICS 2022. [DOI: 10.3390/electronics11020198] [Citation(s) in RCA: 13] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/04/2022]
12
Vu DH. Privacy-Preserving Naive Bayes Classification in Semi-Fully Distributed Data Model. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102630] [Citation(s) in RCA: 6] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
13
Thenmozhi R, Shridevi S, Mohanty SN, García-Díaz V, Gupta D, Tiwari P, Shorfuzzaman M. Attribute-Based Adaptive Homomorphic Encryption for Big Data Security. BIG DATA 2021. [PMID: 34898266 DOI: 10.1089/big.2021.0176] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
14
Wang Q, Ma W, Liu G. SieveNet: Decoupling activation function neural network for privacy-preserving deep learning. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.05.054] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
15
Sun J, Dai Y, Zhao K, Jia Z. Second order Takagi-Sugeno fuzzy model with domain adaptation for nonlinear regression. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.04.024] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
16
Generating transferable adversarial examples based on perceptually-aligned perturbation. INT J MACH LEARN CYB 2021. [DOI: 10.1007/s13042-020-01240-1] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
17
Tran AT, Luong TD, Karnjana J, Huynh VN. An efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation. Neurocomputing 2021. [DOI: 10.1016/j.neucom.2020.10.014] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/03/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA