ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2020
DOI: 10.1109/icassp40776.2020.9053729
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Phishing Web Page Classification Via Fully Homomorphic Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…In recent years, the research increasingly focused on applying privacy-preserving cryptographic protocols and primitives to combat privacy issues during the training and classification of machine learning models. More specifically, secure multiparty computation (MPC) has been applied to both training [21][22][23] and classification [24][25][26][27], whereas solutions including HE have mostly only successfully been applied to classification tasks [28][29][30][31][32][33]. Training machine learning models on homomorphically encrypted inputs is still an ongoing research questions.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, the research increasingly focused on applying privacy-preserving cryptographic protocols and primitives to combat privacy issues during the training and classification of machine learning models. More specifically, secure multiparty computation (MPC) has been applied to both training [21][22][23] and classification [24][25][26][27], whereas solutions including HE have mostly only successfully been applied to classification tasks [28][29][30][31][32][33]. Training machine learning models on homomorphically encrypted inputs is still an ongoing research questions.…”
Section: Related Workmentioning
confidence: 99%
“…After the successful implementation of Craig Gentry's (Stanford Ph.D. thesis 2009) work, homomorphic operations have become an important, futuristic technique in cloud computing. Some of the recent works on homomorphic encryptions are Cominetti et al [35], Chou et al [36], and Turan et al [37]. [38] and Elgamal encryption [39] in which the plaintexts are encoded in the exponents.…”
Section: Preliminaries: Homomorphic Encryptionmentioning
confidence: 99%
“…Moreover, the phishing URL database [2,21,24] that stores the observed phishing attacks provides an ideal testbed for the deep-learning-based URL classification task with a relatively closed environment. Various deep-learning methods such as CNN [5,6] and its modification [18,25,26] are proposed, as well as the LSTM-based generative adversarial network (GAN) [17] for exploiting the class imbalance issue by generating phishing URLs.…”
Section: Related Workmentioning
confidence: 99%