Privacy-preserving neural networks with homomorphic encryption: C hallenges and opportunities

B Pulido-Gaytan, A Tchernykh… - Peer-to-Peer Networking …, 2021 - Springer
Classical machine learning modeling demands considerable computing power for internal
calculations and training with big data in a reasonable amount of time. In recent years …

Secure Data Computation Using Deep Learning and Homomorphic Encryption: A Survey.

AA Al-Janabi, STF Al-Janabi… - International Journal of …, 2023 - search.ebscohost.com
Deep learning and its variant techniques have surpassed classical machine algorithms due
to their high performance gaining remarkable results and are used in a broad range of …

RRNS base extension error-correcting code for performance optimization of scalable reliable distributed cloud data storage

M Babenko, A Tchernykh… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
Ensuring reliable data storage in a cloud environment is a challenging problem. One of the
efficient mechanisms used to solve it is the Redundant Residue Number System (RRNS) …

Privacy‐Preserving Outsourced Logistic Regression on Encrypted Data from Homomorphic Encryption

X Yu, W Zhao, Y Huang, J Ren… - Security and …, 2022 - Wiley Online Library
Logistic regression is a data statistical technique, which is used to predict the probability that
an event occurs. For some scenarios where the storage capabilities and computing …

Towards Understanding Efficient Privacy-Preserving Homomorphic Comparison

B Pulido-Gaytan, A Tchernykh, F Leprévost… - IEEE …, 2023 - ieeexplore.ieee.org
The security issues that arise in public cloud environments raise several concerns about
privacy-preserving. Conventional security practices successfully protect stored and …

An efficient method for comparing numbers and determining the sign of a number in RNS for even ranges

A Tchernykh, M Babenko, E Shiriaev, B Pulido-Gaytan… - Computation, 2022 - mdpi.com
Fully Homomorphic Encryption (FHE) permits processing information in the form of
ciphertexts without decryption. It can ensure the security of information in common …

LR-GD-RNS: enhanced privacy-preserving logistic regression algorithms for secure deployment in untrusted environments

JM Cortés-Mendoza, G Radchenko… - 2021 IEEE/ACM 21st …, 2021 - ieeexplore.ieee.org
The protection of data processing is emerging as an essential aspect of data analytics,
machine learning, delegation of computation, Internet of Things, medical and financial …

Enhancing Cloud Security through Efficient Polynomial Approximations for Homomorphic Evaluation of Neural Network Activation Functions

B Pulido-Gaytan, A Tchemykh… - 2024 IEEE 24th …, 2024 - ieeexplore.ieee.org
Current security cloud practices can successfully protect stored data and data in transit, but
they do not keep the same protection during data processing. The data value extraction …

An Enhanced Network Anomaly Intrusion Detection System Using Dimensionality Reduction Approach and Residue Number System

BF Balogun - 2023 - search.proquest.com
Abstract Intrusion Detection Systems (IDS) frequently employ Machine Learning (ML)
techniques for anomaly detection. Due to the time-consuming nature of detecting anomalies …

Precision agriculture and irrigation strategies to improve crop water productivity of chickpeas (Cicer arietinum L

JDO Amador - 2024 - cicese.repositorioinstitucional.mx
The water demand to achieve the food production for a growing population and the scarcity
of this resource, implies evaluating different strategies to increase crop water productivity …