2021
DOI: 10.1109/tsc.2019.2911282
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 52 publications
0
5
0
Order By: Relevance
“…To address these problems, a large number of improved solutions were proposed. For example, the VC protocols for securely outsourcing linear programming [24,25], matrix inversion [6,11], matrix-matrix multiplication [7,26], matrix determinant [8], linear regression [27,28], the large-scale system of linear equations [10,[29][30][31][32][33][34][35], compressed sensing reconstruction [12], and non-negative matrix factorization [36] have been investigated. Tang et al [37] presented a methodology called PILE for privacy-preserving federated learning with verifiable perturbations.…”
Section: Related Workmentioning
confidence: 99%
“…To address these problems, a large number of improved solutions were proposed. For example, the VC protocols for securely outsourcing linear programming [24,25], matrix inversion [6,11], matrix-matrix multiplication [7,26], matrix determinant [8], linear regression [27,28], the large-scale system of linear equations [10,[29][30][31][32][33][34][35], compressed sensing reconstruction [12], and non-negative matrix factorization [36] have been investigated. Tang et al [37] presented a methodology called PILE for privacy-preserving federated learning with verifiable perturbations.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, Nonnegative Matrix Factorization (NMF) is widely used in DIP, face recognition, text analysis, and other fields. Thus, there are many secure outsourcing algorithms for NMF [27][28][29][30]. Matrix inverse is also one of the most basic computations in large-scale data analysis.…”
Section: Related Work and Comparative Analysismentioning
confidence: 99%
“…Zhang et al [31] proposed a secure outsourcing computation framework for PCA-based face recognition. Duan et al [8] and Fu et al [10] proposed outsourcing computation frameworks for non-negative matrix factorization through random permutation and homomorphic encryption, respectively. Luo et al [22] proposed a masking based outsourcing computation method for QR and LU factorization.…”
Section: Related Workmentioning
confidence: 99%