Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack
From MaRDI portal
Publication:2195311
DOI10.1016/j.ins.2018.02.058zbMath1440.68210OpenAlexW2791750046MaRDI QIDQ2195311
Jin Li, Pei He, Chongzhi Gao, Willy Susilo, Qiong Cheng
Publication date: 8 September 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.02.058
Classification and discrimination; cluster analysis (statistical aspects) (62H30) Learning and adaptive systems in artificial intelligence (68T05) Data encryption (aspects in computer science) (68P25) Privacy of data (68P27)
Related Items
Incentive-driven attacker for corrupting two-party protocols ⋮ Efficient and secure big data storage system with leakage resilience in cloud computing ⋮ Identity-based data storage scheme with anonymous key generation in fog computing ⋮ Secure multi-label data classification in cloud by additionally homomorphic encryption ⋮ Machine learning based classification of normal, slow and fast walking by extracting multimodal features from stride interval time series ⋮ Practical public key encryption with selective opening security for receivers ⋮ A hierarchical group key agreement protocol using orientable attributes for cloud computing ⋮ A strong designated verifier proxy re-signature scheme for IoT environments
Uses Software
Cites Work
- A proof of security of Yao's protocol for two-party computation
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud
- Homomorphic encryption and secure comparison
- Improved OT Extension for Transferring Short Secrets
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing
- SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers
- Secure Distributed Deduplication Systems with Improved Reliability
- Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols
- A Framework for Efficient and Composable Oblivious Transfer
- A Further Improved Online/Offline Signature Scheme
- Secure Two-Party Computation Is Practical
- Privacy-Preserving Classifier Learning
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Foundations of Cryptography
- KERNEL-BASED NAIVE BAYES CLASSIFIER FOR BREAST CANCER PREDICTION
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
- Privacy preserving data mining