2017
DOI: 10.1016/j.patcog.2017.06.016
|View full text |Cite
|
Sign up to set email alerts
|

Training Support Vector Machines with privacy-protected data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(32 citation statements)
references
References 28 publications
0
32
0
Order By: Relevance
“…The operations in multilinear mode product are multiplication and addition. Therefore, the secure multilinear mode product protocol (SMMP) using the collaborative cloud model can be implemented by exploiting secure multiplication protocol (SM) [17] and the Paillier addition property. Formally, the protocol is defined as follows:…”
Section: Secure Multilinear Mode Product and Secure Tensor Additionmentioning
confidence: 99%
See 1 more Smart Citation
“…The operations in multilinear mode product are multiplication and addition. Therefore, the secure multilinear mode product protocol (SMMP) using the collaborative cloud model can be implemented by exploiting secure multiplication protocol (SM) [17] and the Paillier addition property. Formally, the protocol is defined as follows:…”
Section: Secure Multilinear Mode Product and Secure Tensor Additionmentioning
confidence: 99%
“…Another popular line of research uses partially homomorphic cryptosystem based secure cloud model to securely process data. In such an approach, the cloud offloads majority, or all, computations of the data users in applications such as secure facial expression recognition [24], secure back-propagation neural network learning [25] over unencrypted data in the cloud, and secure query processing [26], secure large-scale similarity search [27] and secure support vector machine [17] over encrypted data in the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…ELM was proposed in 2004 by Huang [51]. Different from traditional algorithms (such as BP algorithm), ELM randomly generates the weights between the input layer, the hidden layer, and the thresholds of the hidden layer node.…”
Section: Extreme Learning Machine (Elm)mentioning
confidence: 99%
“…Later, Salinas et al [53] presented a transformed quadratic program and its solver, namely Gauss-Seidel algorithm, for securely outsourcing SVM training while reducing the client's computation. According to a primal estimated sub-gradient solver and replacing the SVs with data prototypes, the most recent work [54] gives a solution of training SVM model with data encrypted by homomorphic encryption.…”
Section: Related Workmentioning
confidence: 99%