Differentially private naive Bayes learning over multiple data sources
From MaRDI portal
Publication:2195313
DOI10.1016/j.ins.2018.02.056zbMath1440.68222OpenAlexW2794222060MaRDI QIDQ2195313
Tong Li, Jin Li, Chunfu Jia, Ping Li, Zheli Liu
Publication date: 8 September 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.02.056
Classification and discrimination; cluster analysis (statistical aspects) (62H30) Learning and adaptive systems in artificial intelligence (68T05) Privacy of data (68P27)
Related Items
Incentive-driven attacker for corrupting two-party protocols, Efficient and secure big data storage system with leakage resilience in cloud computing, Identity-based data storage scheme with anonymous key generation in fog computing, Secure server-aided data sharing clique with attestation, An efficient approach for secure multi-party computation without authenticated channel, CPP: towards comprehensive privacy preserving for query processing in information networks, Secure multi-label data classification in cloud by additionally homomorphic encryption, Practical public key encryption with selective opening security for receivers, A hierarchical group key agreement protocol using orientable attributes for cloud computing, Privacy-Preserving Subgraph Matching Protocol for Two Parties, Nonce-Based Key Agreement Protocol Against Bad Randomness, A Secure and Efficient Code-Based Signature Scheme, Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity, A strong designated verifier proxy re-signature scheme for IoT environments
Uses Software
Cites Work
- Insight of the protection for data security under selective opening attacks
- CDPS: a cryptographic data publishing system
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing
- Verifiable Computation over Large Database with Incremental Updates
- Implementing Gentry’s Fully-Homomorphic Encryption Scheme
- The Algorithmic Foundations of Differential Privacy
- Differential Privacy: A Survey of Results
- Our Data, Ourselves: Privacy Via Distributed Noise Generation
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- ML Confidential: Machine Learning on Encrypted Data
- Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$
- Unnamed Item
- Unnamed Item