Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy challenges and research opportunities for genomic data sharing
L Bonomi, Y Huang, L Ohno-Machado - Nature genetics, 2020 - nature.com
The sharing of genomic data holds great promise in advancing precision medicine and
providing personalized treatments and other types of interventions. However, these …
providing personalized treatments and other types of interventions. However, these …
Homomorphic encryption for machine learning in medicine and bioinformatics
Machine learning and statistical techniques are powerful tools for analyzing large amounts
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …
of medical and genomic data. On the other hand, ethical concerns and privacy regulations …
Homomorphic encryption for arithmetic of approximate numbers
We suggest a method to construct a homomorphic encryption scheme for approximate
arithmetic. It supports an approximate addition and multiplication of encrypted messages …
arithmetic. It supports an approximate addition and multiplication of encrypted messages …
Bootstrap** for approximate homomorphic encryption
This paper extends the leveled homomorphic encryption scheme for an approximate
arithmetic of Cheon et al.(ASIACRYPT 2017) to a fully homomorphic encryption, ie, we …
arithmetic of Cheon et al.(ASIACRYPT 2017) to a fully homomorphic encryption, ie, we …
SoK: Fully homomorphic encryption compilers
Fully Homomorphic Encryption (FHE) allows a third party to perform arbitrary computations
on encrypted data, learning neither the inputs nor the computation results. Hence, it provides …
on encrypted data, learning neither the inputs nor the computation results. Hence, it provides …
Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression
In typical applications of homomorphic encryption, the first step consists for Alice of
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …
Scalable and secure logistic regression via homomorphic encryption
Y Aono, T Hayashi, L Trieu Phong, L Wang - Proceedings of the sixth …, 2016 - dl.acm.org
Logistic regression is a powerful machine learning tool to classify data. When dealing with
sensitive data such as private or medical information, cares are necessary. In this paper, we …
sensitive data such as private or medical information, cares are necessary. In this paper, we …
Revisiting lattice attacks on overstretched NTRU parameters
P Kirchner, PA Fouque - Annual International Conference on the Theory …, 2017 - Springer
Abstract In 2016, Albrecht, Bai and Ducas and independently Cheon, Jeong and Lee
presented very similar attacks to break the NTRU cryptosystem with larger modulus than in …
presented very similar attacks to break the NTRU cryptosystem with larger modulus than in …
Crypto-nets: Neural networks over encrypted data
The problem we address is the following: how can a user employ a predictive model that is
held by a third party, without compromising private information. For example, a hospital may …
held by a third party, without compromising private information. For example, a hospital may …
cuHE: A homomorphic encryption accelerator library
We introduce a CUDA GPU library to accelerate evaluations with homomorphic schemes
defined over polynomial rings enabled with a number of optimizations including algebraic …
defined over polynomial rings enabled with a number of optimizations including algebraic …