2018
DOI: 10.1016/j.comnet.2018.01.035
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving sparse representation classification in cloud-enabled mobile applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(19 citation statements)
references
References 20 publications
0
19
0
Order By: Relevance
“…In this combination, a multi-key homomorphic encryption is combined with double decryption mechanisms, fully homomorphic encryptions, and deep learning schemes to preserve the privacy of encrypted data. In [26], a privacy-preserving sparse representation classification technique was proposed for cloud-enabled mobile applications. In this technique, the privacy of data contributors and application users is protected in the presence of an untrusted cloud server against various types of attacks, such as content privacy attack, source privacy attack, and label privacy attack.…”
Section: B Privacy-preserving Using Machine Learning Methodologiesmentioning
confidence: 99%
See 1 more Smart Citation
“…In this combination, a multi-key homomorphic encryption is combined with double decryption mechanisms, fully homomorphic encryptions, and deep learning schemes to preserve the privacy of encrypted data. In [26], a privacy-preserving sparse representation classification technique was proposed for cloud-enabled mobile applications. In this technique, the privacy of data contributors and application users is protected in the presence of an untrusted cloud server against various types of attacks, such as content privacy attack, source privacy attack, and label privacy attack.…”
Section: B Privacy-preserving Using Machine Learning Methodologiesmentioning
confidence: 99%
“…In this technique, the privacy of data contributors and application users is protected in the presence of an untrusted cloud server against various types of attacks, such as content privacy attack, source privacy attack, and label privacy attack. Schemes presented in [22]- [26] are able to stand against various types of privacy attacks, however, these schemes are not suitable for real-time IoMT applications.…”
Section: B Privacy-preserving Using Machine Learning Methodologiesmentioning
confidence: 99%
“…The approach proposed in this paper also belongs to this category. In the following, we review each of [22,29,39] and then discuss our new design to overcome their shortcomings.…”
Section: Training Data Encryption/obfuscationmentioning
confidence: 99%
“…These services support human daily life by studying mobility patterns from trillions of trails and footprints [12]. Urban planning [13], face recognition [14], classification [15], traffic forecasting [16], marker campaign [17], prediction of epidemics [18,19], latent data privacy [20], and designing of mobile network protocols [21] are all powered by human mobility trajectories. Some other services exploit the users' daily mobility datasets finding the mobility patterns and mining users' activities to provide useful extensive services [22].…”
Section: Services For the Mobility Datasetsmentioning
confidence: 99%