Maintenance Notice

Due to necessary scheduled maintenance, the JMIR Publications website will be unavailable from Wednesday, July 01, 2020 at 8:00 PM to 10:00 PM EST. We apologize in advance for any inconvenience this may cause you.

Who will be affected?

Citing this Article

Right click to copy or hit: ctrl+c (cmd+c on mac)

Published on 17.04.18 in Vol 6, No 2 (2018): Apr-Jun

This paper is in the following e-collection/theme issue:

Works citing "Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation"

According to Crossref, the following articles are citing this article (DOI 10.2196/medinform.8805):

(note that this is only a small subset of citations)

  1. Kim M, Lee J, Ohno-Machado L, Jiang X. Secure and Differentially Private Logistic Regression for Horizontally Distributed Data. IEEE Transactions on Information Forensics and Security 2020;15:695
    CrossRef
  2. Kang JY. Some Properties and Distribution of the Zeros of the q-Sigmoid Polynomials. Discrete Dynamics in Nature and Society 2020;2020:1
    CrossRef
  3. Li J, Kuang X, Lin S, Ma X, Tang Y. Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Information Sciences 2020;526:166
    CrossRef
  4. Xie Y, Wang H, Yu B, Zhang C. Secure collaborative few-shot learning. Knowledge-Based Systems 2020;203:106157
    CrossRef
  5. Froelicher D, Troncoso-Pastoriza JR, Sousa JS, Hubaux J. Drynx: Decentralized, Secure, Verifiable System for Statistical Queries andMachine Learning on Distributed Datasets. IEEE Transactions on Information Forensics and Security 2020;:1
    CrossRef
  6. Peralta G, Cid-Fuentes RG, Bilbao J, Crespo PM. Homomorphic Encryption and Network Coding in IoT Architectures: Advantages and Future Challenges. Electronics 2019;8(8):827
    CrossRef
  7. Song BK, Yoo JS, Hong M, Yoon JW. A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms. Security and Communication Networks 2019;2019:1
    CrossRef
  8. Yang Q, Liu Y, Chen T, Tong Y. Federated Machine Learning. ACM Transactions on Intelligent Systems and Technology 2019;10(2):1
    CrossRef
  9. Kim A, Song Y, Kim M, Lee K, Cheon JH. Logistic regression model training based on the approximate homomorphic encryption. BMC Medical Genomics 2018;11(S4)
    CrossRef
  10. Cheon JH, Kim D, Kim Y, Song Y. Ensemble Method for Privacy-Preserving Logistic Regression Based on Homomorphic Encryption. IEEE Access 2018;6:46938
    CrossRef

According to Crossref, the following books are citing this article (DOI 10.2196/medinform.8805)

:
  1. Han K, Ki D. Topics in Cryptology – CT-RSA 2020. 2020. Chapter 16:364
    CrossRef
  2. Cheon JH, Kim D, Park JH. Selected Areas in Cryptography – SAC 2019. 2020. Chapter 10:227
    CrossRef
  3. Shaik I, Kumar Singh A, Narumanchi H, Emmadi N, Bhattachar RMA. Cyber Security Cryptography and Machine Learning. 2020. Chapter 13:193
    CrossRef
  4. Laine K. Responsible Genomic Data Sharing. 2020. :97
    CrossRef
  5. Joye M, Petitcolas F. Data Privacy Management, Cryptocurrencies and Blockchain Technology. 2019. Chapter 1:3
    CrossRef
  6. Cheon JH, Han K, Kim A, Kim M, Song Y. Selected Areas in Cryptography – SAC 2018. 2019. Chapter 16:347
    CrossRef
  7. Yoo JS, Hwang JH, Song BK, Yoon JW. Information Security Practice and Experience. 2019. Chapter 2:20
    CrossRef
  8. Cheon JH, Kim D, Kim D, Lee HH, Lee K. Advances in Cryptology – ASIACRYPT 2019. 2019. Chapter 15:415
    CrossRef
  9. Bergamaschi F, Halevi S, Halevi TT, Hunt H. Applied Cryptography and Network Security. 2019. Chapter 29:592
    CrossRef
  10. Kim D, Song Y. Information Security and Cryptology – ICISC 2018. 2019. Chapter 6:85
    CrossRef
  11. Cheon JH, Han K, Kim A, Kim M, Song Y. Advances in Cryptology – EUROCRYPT 2018. 2018. Chapter 14:360
    CrossRef