Neural networks for encrypted data

R Gilad-Bachrach, TW Finley, M Bilenko… - US Patent 9,946,970, 2018 - Google Patents
Embodiments described herein are directed to methods and systems for performing neural
network computations on encrypted data. Encrypted data is received from a user. The …

EPIC: efficient private image classification (or: Learning from the masters)

E Makri, D Rotaru, NP Smart, F Vercauteren - … , CA, USA, March 4–8, 2019 …, 2019 - Springer
Outsourcing an image classification task raises privacy concerns, both from the image
provider's perspective, who wishes to keep their images confidential, and from the …

HE-friendly algorithm for privacy-preserving SVM training

S Park, J Byun, J Lee, JH Cheon, J Lee - IEEE Access, 2020 - ieeexplore.ieee.org
Support vector machine (SVM) is one of the most popular machine learning algorithms. It
predicts a pre-defined output variable in real-world applications. Machine learning on …

DAG: a general model for privacy-preserving data mining

SG Teo, J Cao, VCS Lee - IEEE Transactions on Knowledge …, 2018 - ieeexplore.ieee.org
Secure multi-party computation (SMC) allows parties to jointly compute a function over their
inputs, while keeping every input confidential. It has been extensively applied in tasks with …

An efficient secure k nearest neighbor classification protocol with high‐dimensional features

M Sun, R Yang - International Journal of Intelligent Systems, 2020 - Wiley Online Library
Abstract k Nearest neighbor (kNN) classification algorithm is a prediction model which is
widely used for real‐life applications, such as healthcare, finance, computer vision …

Image classification using non-linear support vector machines on encrypted data

A Barnett, J Santokhi, M Simpson, NP Smart… - Cryptology ePrint …, 2017 - eprint.iacr.org
In image processing, algorithms for object classification are typically based around machine
learning. From the algorithm developer's perspective, these can involve a considerable …

Fast homomorphic SVM inference on encrypted data

A Al Badawi, L Chen, S Vig - Neural Computing and Applications, 2022 - Springer
Kernel methods are popular machine learning methods that provide automated pattern
analysis of raw datasets. Of particular interest is Support Vector Machines that are used to …

Big data analysis using computational intelligence and Hadoop: a study

A Gupta - 2015 2nd International Conference on Computing for …, 2015 - ieeexplore.ieee.org
Computational Intelligence (CI) techniques are expected to provide powerful tools for
addressing Big Data challenges. The main techniques in CI, such as evolutionary …

Practical Privacy Preserving‐Aided Disease Diagnosis with Multiclass SVM in an Outsourced Environment

R Zhao, Y Xie, X Jia, H Wang… - Security and …, 2022 - Wiley Online Library
With the rapid development of cloud computing and machine learning, using outsourced
stored data and machine learning model for training and online‐aided disease diagnosis …

Ml with he: Privacy preserving machine learning inferences for genome studies

ŞS Mağara, C Yıldırım, F Yaman, B Dilekoğlu… - arXiv preprint arXiv …, 2021 - arxiv.org
Preserving the privacy and security of big data in the context of cloud computing, while
maintaining a certain level of efficiency of its processing remains to be a subject, open for …