2014
DOI: 10.1007/s13042-014-0245-1
|View full text |Cite
|
Sign up to set email alerts
|

A new privacy-preserving proximal support vector machine for classification of vertically partitioned data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…Recently, people have become interested in privacy-preserving classification and data mining [1][2][3][4][5][6][7][8][9][10] and have been involved in the field of optimization, especially in linear programming [11][12][13][14][15], where the data to be classified or mined belongs to different entities that are not willing to disclose the data. Mangasarian [13] proposed a random matrix which make the original linear programming problem into a secure linear programming problem.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, people have become interested in privacy-preserving classification and data mining [1][2][3][4][5][6][7][8][9][10] and have been involved in the field of optimization, especially in linear programming [11][12][13][14][15], where the data to be classified or mined belongs to different entities that are not willing to disclose the data. Mangasarian [13] proposed a random matrix which make the original linear programming problem into a secure linear programming problem.…”
Section: Introductionmentioning
confidence: 99%
“…e linear programming (1) Proof. As the matrix B is an m-order invertible matrix, the following relation holds:…”
Section: Introductionmentioning
confidence: 99%
“…Activity recognition forms the core of IoT based services, including health monitoring and the eldercare at smart homes [1][2][3]. Activity recognition based on the inertial sensors embedded in the smartphone has received classification algorithms, including PPSVM [8][9][10][11][12][13][14] PPKNN [15,16], privacy preserving logistic regression [6,17] and naive bays [18][19][20][21]. Another challenge for such sensor-based activity recognition task is the difference in the statistical distributions of training and testing data [22].…”
Section: Introductionmentioning
confidence: 99%
“…Due to law and privacy policies, the data cannot be pooled in one place. In these cases, solutions that provide data privacy are preferred instead of traditional data mining algorithms [1], [2].…”
Section: Introductionmentioning
confidence: 99%