NPMML: A framework for non-interactive privacy-preserving multi-party machine learning

T Li, J Li, X Chen, Z Liu, W Lou… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In the recent decade, deep learning techniques have been widely adopted for founding
artificial Intelligent applications, which led to successes in many data analysis tasks, such as …

Cloud-based quadratic optimization with partially homomorphic encryption

AB Alexandru, K Gatsis, Y Shoukry… - … on Automatic Control, 2020 - ieeexplore.ieee.org
This article develops a cloud-based protocol for a constrained quadratic optimization
problem involving multiple parties, each holding private data. The protocol is based on the …

Secure optimization computation outsourcing in cloud computing: A case study of linear programming

C Wang, K Ren, J Wang - IEEE transactions on computers, 2015 - ieeexplore.ieee.org
Cloud computing enables an economically promising paradigm of computation outsourcing.
However, how to protect customers confidential data processed and generated during the …

Highly efficient linear regression outsourcing to a cloud

F Chen, T **ang, X Lei, J Chen - IEEE transactions on cloud …, 2014 - ieeexplore.ieee.org
With cloud computing and mobile computing becoming more and more popular, there are a
lot potential applications for computation outsourcing to the cloud. This paper investigates …

Private optimization on networks

S Gade, NH Vaidya - 2018 Annual American Control …, 2018 - ieeexplore.ieee.org
This paper considers a distributed multi-agent optimization problem, with the global
objective consisting of the sum of local objective functions of the agents. The agents solve …

Practical privacy-preserving multiparty linear programming based on problem transformation

J Dreier, F Kerschbaum - … on Privacy, Security, Risk and Trust …, 2011 - ieeexplore.ieee.org
Cryptographic solutions to privacy-preserving multiparty linear programming are slow. This
makes them unsuitable for many economically important applications, such as supply chain …

A verifiable multiparty computation solver for the linear assignment problem: And applications to air traffic management

T Lorünser, F Wohner, S Krenn - Proceedings of the 2022 on Cloud …, 2022 - dl.acm.org
The assignment problem is an essential problem in many application fields and frequently
used to optimize resource usage. The problem is well understood and various efficient …

Minimization of randomized unit test cases

Y Lei, JH Andrews - 16th IEEE International Symposium on …, 2005 - ieeexplore.ieee.org
We describe a framework for randomized unit testing, and give empirical evidence that
generating unit test cases randomly and then minimizing the failing test cases results in …

An efficient and privacy‐preserving scheme for P2P energy exchange among smart microgrids

Y Hong, S Goel, WM Liu - International Journal of Energy …, 2016 - Wiley Online Library
To date, increasing number of entities on the smart grid begin to establish their local energy
generator for ensuring reliability and resilience of power supply. These 'microgrids' can …

Design of large scale applications of secure multiparty computation: secure linear programming

SJA de Hoogh - 2012 - research.tue.nl
Secure multiparty computation is a basic concept of growing interest in modern
cryptography. It allows a set of mutually distrusting parties to perform a computation on their …