Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Homomorphic encryption for machine learning in medicine and bioinformatics
Machine learning and statistical techniques are powerful tools for analyzing large amounts
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …
Privacy-preserving neural networks with homomorphic encryption: C hallenges and opportunities
B Pulido-Gaytan, A Tchernykh… - Peer-to-Peer Networking …, 2021 - Springer
Classical machine learning modeling demands considerable computing power for internal
calculations and training with big data in a reasonable amount of time. In recent years …
calculations and training with big data in a reasonable amount of time. In recent years …
Survey on fully homomorphic encryption, theory, and applications
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …
cloud services, edge computing, artificial intelligence applications, and other applications …
HEAX: An architecture for computing on encrypted data
With the rapid increase in cloud computing, concerns surrounding data privacy, security, and
confidentiality also have been increased significantly. Not only cloud providers are …
confidentiality also have been increased significantly. Not only cloud providers are …
Labeled PSI from fully homomorphic encryption with malicious security
Private Set Intersection (PSI) allows two parties, the sender and the receiver, to compute the
intersection of their private sets without revealing extra information to each other. We are …
intersection of their private sets without revealing extra information to each other. We are …
Towards deep neural network training on encrypted data
K Nandakumar, N Ratha… - Proceedings of the …, 2019 - openaccess.thecvf.com
While deep learning is a valuable tool for solving many tough problems in computer vision,
the success of deep learning models is typically determined by:(i) availability of sufficient …
the success of deep learning models is typically determined by:(i) availability of sufficient …
Efficient and secure decision tree classification for cloud-assisted online diagnosis services
Decision tree classification has become a prevailing technique for online diagnosis services.
By outsourcing computation intensive tasks to a cloud server, cloud-assisted online …
By outsourcing computation intensive tasks to a cloud server, cloud-assisted online …
Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack
Naive Bayes (NB) is a simple but highly practical classifier, with a wide range of applications
including spam filters, cancer diagnosis and face recognition, to name a few examples only …
including spam filters, cancer diagnosis and face recognition, to name a few examples only …
A survey on fully homomorphic encryption: An engineering perspective
It is unlikely that a hacker is able to compromise sensitive data that is stored in an encrypted
form. However, when data is to be processed, it has to be decrypted, becoming vulnerable to …
form. However, when data is to be processed, it has to be decrypted, becoming vulnerable to …
Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression
In typical applications of homomorphic encryption, the first step consists for Alice of
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …