2023
DOI: 10.1109/tifs.2023.3283104
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
10

Relationship

2
8

Authors

Journals

citations
Cited by 48 publications
(19 citation statements)
references
References 36 publications
0
19
0
Order By: Relevance
“…An ORE scheme over a well-ordered domain D is correct if for sk ← ORE.Setup(1 λ ) and all messages m1, m2 ∈ D [29][30][31]:…”
Section: Model Of a Time-varying Network Querymentioning
confidence: 99%
“…An ORE scheme over a well-ordered domain D is correct if for sk ← ORE.Setup(1 λ ) and all messages m1, m2 ∈ D [29][30][31]:…”
Section: Model Of a Time-varying Network Querymentioning
confidence: 99%
“…When energy consumers actively participate in microgrid electricity transactions, the opportunities lie in enhancing energy independence and promoting sustainable development. However, this also brings about regulatory complexities 9 , interoperability requirements 10 , data privacy concerns 11 , 12 , and challenges related to supply-demand balance 13 .…”
Section: Introductionmentioning
confidence: 99%
“…However, in existing fine-grained redactable blockchains, users’ policies are public to all users, making them unsuitable for some policy-sensitive IoT systems, such as IoT-based smart healthcare and smart transportation [ 20 ]. In these IoT systems, users’ policies contain sensitive private information, e.g., users’ health conditions and geographical locations [ 21 ]. For instance, in an IoT-based smart healthcare application, users use their IoT devices (e.g., smartwatches) to record their health data and utilize blockchain-based IoT systems to manage the data.…”
Section: Introductionmentioning
confidence: 99%