Browse > Article

프라이버시 보존 분류 방법 동향 분석  

Kim, Pyung (서울과학기술대학교 ITM 전공)
Moon, Su-Bin (서울과학기술대학교 SW분석설계학과)
Jo, Eun-Ji (서울과학기술대학교 SW분석설계학과)
Lee, Younho (서울과학기술대학교 ITM 전공)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Wiens, J. Guttag, E. Horvitz, "Learning evolving patient risk processes for c. diff colonization," ICML Workshop on Machine Learning from Clinical Data, 2012.
2 A. Singh, J.Guttag, "A comparison of non-symmetric entropy-based classificat- ion trees and support vector machine for cardiovascular risk stratification," Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 79-82, 2011.
3 A. Singh, G. Nadkarni, J. Guttag, E. Bottinger, "Leveraging hierarchy in medical codes for predictive modeling," Proceedings of the 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. ACM, pp. 96-103, 2014.
4 C. Aggarwal, S. Philip, "A general survey of privacy-preserving data mining models and algorithms," Privacy-preserving data mining, Springer US, pp. 11-52, 2008.
5 R. Bost, R. Popa, S. Tu, S. Goldwasser, "Machine Learning Classification over Encrypted Data," NDSS, 2015.
6 A. Yao, "Protocols for secure computations," Annual Symposium on Foundations of Computer Science, IEEE, pp. 160-164, 1982.
7 W. Henecka, A. Sadeghi, T. Schneider, I. Wehrenberg, "TASTY: tool for automating secure two-party computations," Proceedings of the 17th ACM conference on Computer and communications security, ACM, pp. 451-462, 2010.
8 D Malkhi, N Nisan, B Pinkas, Y Sella, "Fairplay-Secure Two-Party Computation System." USENIX Security Symposium, 4, 2004.
9 P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," International Conference on the Theory and Applications of Cryptographic Techniques. Springer Berlin Heidelberg, pp. 223-238, 1999.
10 S. Goldwasser, S. Micali. "Probabilistic encryption & how to play mental poker keeping secret all partial information," Proceedings of the fourteenth annual ACM symposium on Theory of computing, ACM, pp. 365-377, 1982.
11 I. Damgard, M. Geisler, M. Kroigard. "A correction to'efficient and secure comparison for on-line auctions'," International Journal of Applied Cryptography, 1(4), pp. 323-324, 2009.   DOI
12 C. Gentry, "Fully homomorphic encryption using ideal lattices," STOC. Vol. 9. pp. 169-178, 2009.   DOI
13 D. Beaver, "Commodity-based cryptography," Proceedings of the twenty-ninth annual ACM symposium on Theory of computing, ACM, pp. 446-455, 1997.
14 J. Ziegeldorf, J. Metzke, M. Henze, K. Wehrle, "Choose wisely: a comparison of secure two-party computation frameworks," Security and Privacy Workshops, IEEE, pp. 198-205, 2015.
15 M. Barni, P. Failla, R. Lazzeretti, A. Paus, A. Sadeghi, T. Schneider, V. Kolesnikov, "Efficient privacy-preserving classification of ECG signals," First IEEE International Workshop on Information Forensics and Security, IEEE, pp. 91-95, 2009.
16 D. Wu, T. Feng, M. Naehrig, K. Lauter, "Privately evaluating decision trees and random forests," Proceedings on Privacy Enhancing Technologies, 4, pp. 335-355, 2016.
17 T. Veugen, "Improving the DGK comparison protocol," International Workshop on Information Forensics and Security, IEEE, pp. 49-54, 2012.
18 X. Liu, R. Lu, J. Ma, L. Chen, B. Qin, "Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification," IEEE journal of biomedical and health informatics 20(2), pp. 655-668, 2016.   DOI
19 Y. Elmehdwi, B. Samanthula, W. Jiang, "K-nearest neighbor classification over semantically secure encrypted relational data," IEEE transactions on Knowledge and data engineering, 27(5), pp. 1261-1273, 2015.   DOI
20 T. Graepel, K. Lauter, M. Naehrig, "ML confidential: Machine learning on encrypted data," International Conference on Information Security and Cryptology, Springer Berlin Heidelberg, pp. 1-21, 2012.
21 J. Bos, K. Lauter, M. Naehrig, "Private predictive analysis on encrypted medical data," Journal of biomedical informatics, 50, pp. 234-243, 2014.   DOI
22 G. Asharov, Y. Lindell, T. Schneider, M. Zohner, "More efficient oblivious transfer and extensions for faster secure computation," Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, ACM, pp. 535-548, 2013.
23 M. Cock, R. Dowsley, C. Horst, R. Katti, A. Nascimento, W. Poon, S. Truex, "Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation," IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2017.2679189, 2017.   DOI
24 A. Khedr, G. Gulak, V. Vaikuntanathan, "SHIELD: scalable homomorphic implementation of encrypted data-classifiers," IEEE Transactions on Computers, 65(9), pp. 2848-2858, 2016.   DOI
25 W. Lu, S. Kawasaki, J. Sakuma, "Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data," 2017.
26 B. David, R. Dowsley, R. Katti, A. Nascimento, "Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols," International Conference on Provable Security. Springer International Publishing, pp. 354-367, 2015.