Published on in Vol 6, No 2 (2018): Apr-Jun

Preprints (earlier versions) of this paper are available at https://preprints.jmir.org/preprint/8805, first published .
Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation

Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation

Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation

Journals

  1. Sim J, Chan F, Chen S, Meng Tan B, Mi Aung K. Achieving GWAS with homomorphic encryption. BMC Medical Genomics 2020;13(S7) View
  2. Kim M, Song Y, Li B, Micciancio D. Semi-Parallel logistic regression for GWAS on encrypted data. BMC Medical Genomics 2020;13(S7) View
  3. Kim M, Lee J, Ohno-Machado L, Jiang X. Secure and Differentially Private Logistic Regression for Horizontally Distributed Data. IEEE Transactions on Information Forensics and Security 2020;15:695 View
  4. Kang J. Some Properties and Distribution of the Zeros of the q-Sigmoid Polynomials. Discrete Dynamics in Nature and Society 2020;2020:1 View
  5. Kim A, Song Y, Kim M, Lee K, Cheon J. Logistic regression model training based on the approximate homomorphic encryption. BMC Medical Genomics 2018;11(S4) View
  6. Peralta G, Cid-Fuentes R, Bilbao J, Crespo P. Homomorphic Encryption and Network Coding in IoT Architectures: Advantages and Future Challenges. Electronics 2019;8(8):827 View
  7. Li J, Kuang X, Lin S, Ma X, Tang Y. Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Information Sciences 2020;526:166 View
  8. Xie Y, Wang H, Yu B, Zhang C. Secure collaborative few-shot learning. Knowledge-Based Systems 2020;203:106157 View
  9. Song B, Yoo J, Hong M, Yoon J. A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms. Security and Communication Networks 2019;2019:1 View
  10. Kim D, Son Y, Kim D, Kim A, Hong S, Cheon J. Privacy-preserving approximate GWAS computation based on homomorphic encryption. BMC Medical Genomics 2020;13(S7) View
  11. Froelicher D, Troncoso-Pastoriza J, Sousa J, Hubaux J. Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets. IEEE Transactions on Information Forensics and Security 2020;15:3035 View
  12. Lee Y, Lee J, Kim Y, No J. Near-Optimal Polynomial for Modulus Reduction Using L2-Norm for Approximate Homomorphic Encryption. IEEE Access 2020;8:144321 View
  13. Cheon J, Kim D, Kim Y, Song Y. Ensemble Method for Privacy-Preserving Logistic Regression Based on Homomorphic Encryption. IEEE Access 2018;6:46938 View
  14. Yang Q, Liu Y, Chen T, Tong Y. Federated Machine Learning. ACM Transactions on Intelligent Systems and Technology 2019;10(2):1 View
  15. Blatt M, Gusev A, Polyakov Y, Rohloff K, Vaikuntanathan V. Optimized homomorphic encryption solution for secure genome-wide association studies. BMC Medical Genomics 2020;13(S7) View
  16. Zhu R, Jiang C, Wang X, Wang S, Zheng H, Tang H. Privacy-preserving construction of generalized linear mixed model for biomedical computation. Bioinformatics 2020;36(Supplement_1):i128 View
  17. Tran N, Prodan I, Grøtli E, Lefèvre L. Safe navigation in a coastal environment of multiple surface vehicles under uncertainties: A combined use of potential field constructions and NMPC. Ocean Engineering 2020;216:107706 View
  18. Lu Y, Zhou T, Tian Y, Zhu S, Li J. Web-Based Privacy-Preserving Multicenter Medical Data Analysis Tools Via Threshold Homomorphic Encryption: Design and Development Study. Journal of Medical Internet Research 2020;22(12):e22555 View
  19. Badawi A, Hoang L, Mun C, Laine K, Aung K. PrivFT: Private and Fast Text Classification With Homomorphic Encryption. IEEE Access 2020;8:226544 View
  20. Tan Z, Zhang H, Hu P, Gao R, Anees A. Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties. Security and Communication Networks 2021;2021:1 View
  21. Lee T, Lee J, Jun C. Bilingual autoencoder-based efficient harmonization of multi-source private data for accurate predictive modeling. Information Sciences 2021;568:403 View
  22. Yu C, Ding Z, Chen X. HOPE: Software Defect Prediction Model Construction Method via Homomorphic Encryption. IEEE Access 2021;9:69405 View
  23. Al Badawi A, Polyakov Y, Aung K, Veeravalli B, Rohloff K. Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme. IEEE Transactions on Emerging Topics in Computing 2021;9(2):941 View
  24. Lu Y, Tian Y, Zhou T, Zhu S, Li J. Multicenter Privacy-Preserving Cox Analysis Based on Homomorphic Encryption. IEEE Journal of Biomedical and Health Informatics 2021;25(9):3310 View
  25. Zhang B. Classification of Encrypted Text Based on Artificial Intelligence. IOP Conference Series: Materials Science and Engineering 2020;740(1):012133 View
  26. Torkzadehmahani R, Nasirigerdeh R, Blumenthal D, Kacprowski T, List M, Matschinske J, Spaeth J, Wenke N, Baumbach J. Privacy-Preserving Artificial Intelligence Techniques in Biomedicine. Methods of Information in Medicine 2022;61(S 01):e12 View
  27. Sav S, Bossuat J, Troncoso-Pastoriza J, Claassen M, Hubaux J. Privacy-preserving federated neural network learning for disease-associated cell classification. Patterns 2022;3(5):100487 View
  28. Liu Y, Liu Y, Liu Z, Liang Y, Meng C, Zhang J, Zheng Y. Federated Forest. IEEE Transactions on Big Data 2022;8(3):843 View
  29. Chen Z, Hu G, Zheng M, Song X, Chen L. Bibliometrics of Machine Learning Research Using Homomorphic Encryption. Mathematics 2021;9(21):2792 View
  30. Nguyen L, Sigg S, Lietzen J, Findling R, Ruttik K. Camouflage Learning: Feature Value Obscuring Ambient Intelligence for Constrained Devices. IEEE Transactions on Mobile Computing 2023;22(2):781 View
  31. Gaurav A, Psannis K, Peraković D. Security of Cloud-Based Medical Internet of Things (MIoTs). International Journal of Software Science and Computational Intelligence 2021;14(1):1 View
  32. Bharati S, Mondal M, Podder P, Prasath V. Federated learning: Applications, challenges and future directions. International Journal of Hybrid Intelligent Systems 2022;18(1-2):19 View
  33. Hong S, Park J, Cho W, Choe H, Cheon J. Secure tumor classification by shallow neural network using homomorphic encryption. BMC Genomics 2022;23(1) View
  34. Zhao R, Xie Y, Jia X, Wang H, Kumar N, Aswani Kumar C. Practical Privacy Preserving-Aided Disease Diagnosis with Multiclass SVM in an Outsourced Environment. Security and Communication Networks 2022;2022:1 View
  35. Sabry F, Eltaras T, Labda W, Alzoubi K, Malluhi Q, Wu Y. Machine Learning for Healthcare Wearable Devices: The Big Picture. Journal of Healthcare Engineering 2022;2022:1 View
  36. Yu X, Zhao W, Huang Y, Ren J, Tang D, He D. Privacy-Preserving Outsourced Logistic Regression on Encrypted Data from Homomorphic Encryption. Security and Communication Networks 2022;2022:1 View
  37. Yoo J, Yoon J, Son J. t-BMPNet: Trainable Bitwise Multilayer Perceptron Neural Network over Fully Homomorphic Encryption Scheme. Security and Communication Networks 2021;2021:1 View
  38. Dang T, Lan X, Weng J, Feng M. Federated Learning for Electronic Health Records. ACM Transactions on Intelligent Systems and Technology 2022;13(5):1 View
  39. Zhou Y, Song L, Liu Y, Vijayakumar P, Gupta B, Alhalabi W, Alsharif H. A privacy-preserving logistic regression-based diagnosis scheme for digital healthcare. Future Generation Computer Systems 2023;144:63 View
  40. Edemacu K, Kim J. Scalable Multi-Party Privacy-Preserving Gradient Tree Boosting over Vertically Partitioned Dataset with Outsourced Computations. Mathematics 2022;10(13):2185 View
  41. Ishimaki Y, Yamana H. Faster Homomorphic Trace-Type Function Evaluation. IEEE Access 2021;9:53061 View
  42. Topaloglu M, Morrell E, Rajendran S, Topaloglu U. In the Pursuit of Privacy: The Promises and Predicaments of Federated Learning in Healthcare. Frontiers in Artificial Intelligence 2021;4 View
  43. Koklu M, Kursun R, Taspinar Y, Cinar I, Torres J. Classification of Date Fruits into Genetic Varieties Using Image Analysis. Mathematical Problems in Engineering 2021;2021:1 View
  44. Zhao J, Wang W, Wang D, Wang X, Mu C. PMHE: a wearable medical sensor assisted framework for health care based on blockchain and privacy computing. Journal of Cloud Computing 2022;11(1) View
  45. Cheon J, Kim W, Park J. Efficient Homomorphic Evaluation on Large Intervals. IEEE Transactions on Information Forensics and Security 2022;17:2553 View
  46. Ryoo C, Kang J. Several Types of q-Differential Equations of Higher Order and Properties of Their Solutions. Mathematics 2022;10(23):4469 View
  47. Ghavamipour A, Turkmen F, Jiang X. Privacy-preserving logistic regression with secret sharing. BMC Medical Informatics and Decision Making 2022;22(1) View
  48. Zheng M, Ju L, Jiang L. CoFHE: Software and hardware Co-design for FHE-based machine learning as a service. Frontiers in Electronics 2023;3 View
  49. Hong S, Kim S, Choi J, Lee Y, Cheon J. Efficient Sorting of Homomorphic Encrypted Data With k-Way Sorting Network. IEEE Transactions on Information Forensics and Security 2021;16:4389 View
  50. Qayyum A, Qadir J, Bilal M, Al-Fuqaha A. Secure and Robust Machine Learning for Healthcare: A Survey. IEEE Reviews in Biomedical Engineering 2021;14:156 View
  51. Jia H, Aldeen M, Zhao C, Jing S, Chen Z. Flexible privacy‐preserving machine learning: When searchable encryption meets homomorphic encryption. International Journal of Intelligent Systems 2022;37(11):9173 View
  52. Gao C, Li J, Xia S, Choo K, Lou W, Dong C. MAS-Encryption and its Applications in Privacy-Preserving Classifiers. IEEE Transactions on Knowledge and Data Engineering 2022;34(5):2306 View
  53. Babenko M, Tchernykh A, Pulido-Gaytan B, Avetisyan A, Nesmachnow S, Wang X, Granelli F. Towards the Sign Function Best Approximation for Secure Outsourced Computations and Control. Mathematics 2022;10(12):2006 View
  54. Babenko M, Golimblevskaia E, Tchernykh A, Shiriaev E, Ermakova T, Pulido-Gaytan L, Valuev G, Avetisyan A, Gagloeva L. A Comparative Study of Secure Outsourced Matrix Multiplication Based on Homomorphic Encryption. Big Data and Cognitive Computing 2023;7(2):84 View
  55. Zhang Y, Wu Y, Li T, Zhou H, Chen Y. Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing. Computer Modeling in Engineering & Sciences 2023;137(1):345 View
  56. Zhou J, Wu N, Wang Y, Gu S, Cao Z, Dong X, Choo K. A Differentially Private Federated Learning Model against Poisoning Attacks in Edge Computing. IEEE Transactions on Dependable and Secure Computing 2022:1 View
  57. Arazzi M, Nicolazzo S, Nocera A. A Fully Privacy-Preserving Solution for Anomaly Detection in IoT using Federated Learning and Homomorphic Encryption. Information Systems Frontiers 2023 View
  58. Ge S, Feng D, Song S, Wang J, Huang X. Sparse Logistic Regression-Based One-Bit SAR Imaging. IEEE Transactions on Geoscience and Remote Sensing 2023;61:1 View
  59. Pulido-Gaytan B, Tchernykh A, Leprévost F, Bouvry P, Goldman A. Toward Understanding Efficient Privacy-Preserving Homomorphic Comparison. IEEE Access 2023;11:102189 View
  60. Zheng Y, Xu S, Wang S, Gao Y, Hua Z. Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables. IEEE Transactions on Services Computing 2023;16(5):3604 View
  61. Wang J, Pal A, Yang Q, Kant K, Zhu K, Guo S. Collaborative Machine Learning: Schemes, Robustness, and Privacy. IEEE Transactions on Neural Networks and Learning Systems 2023;34(12):9625 View
  62. Jiasen L, An W, Guofeng L, Dan Y, Jindan Z. Improved secure PCA and LDA algorithms for intelligent computing in IoT‐to‐cloud setting. Computational Intelligence 2024;40(1) View
  63. Huang Y, Wang W, Zhao X, Wang Y, Feng X, He H, Yao M. EFMVFL: An Efficient and Flexible Multi-party Vertical Federated Learning without a Third Party. ACM Transactions on Knowledge Discovery from Data 2024;18(3):1 View
  64. Yang W, Kang P, Wei C. MS-FL: A Federated Learning Framework Based on Multiple Security Strategies. IEEE Access 2024;12:8912 View
  65. Divakar Allavarpu V, Naresh V, Krishna Mohan A. Privacy‐preserving credit risk analysis based on homomorphic encryption aware logistic regression in the cloud. SECURITY AND PRIVACY 2024;7(3) View
  66. Wang J, Li J. Blockchain and Access Control Encryption-Empowered IoT Knowledge Sharing for Cloud-Edge Orchestrated Personalized Privacy-Preserving Federated Learning. Applied Sciences 2024;14(5):1743 View
  67. Sharma A, Marchang N. A review on client-server attacks and defenses in federated learning. Computers & Security 2024;140:103801 View
  68. Hallaji E, Razavi-Far R, Saif M, Wang B, Yang Q. Decentralized Federated Learning: A Survey on Security and Privacy. IEEE Transactions on Big Data 2024;10(2):194 View
  69. Bataa M, Song S, Park K, Kim M, Cheon J, Kim S. Finding Highly Similar Regions of Genomic Sequences Through Homomorphic Encryption. Journal of Computational Biology 2024;31(3):197 View
  70. Liu S, Luo J, Zhang Y, Wang H, Yu Y, Xu Z. Efficient privacy-preserving Gaussian process via secure multi-party computation. Journal of Systems Architecture 2024;151:103134 View
  71. Wang H, Chen T, Ding Y, Wang Y, Yang C. Privacy-preserving multi-party logistic regression in cloud computing. Computer Standards & Interfaces 2024;90:103857 View
  72. Jiang H, Shang S, Liu P, Yi T. A fault‐tolerant and scalable boosting method over vertically partitioned data. CAAI Transactions on Intelligence Technology 2024;9(5):1092 View
  73. Sun P, Cai C, Zhang Y, Yip D, Esmradi A. A confidentiality preserved data sharing framework for decision support in the maritime law enforcement. Marine Policy 2024;167:106244 View
  74. Yang F, Zhang X, Guo S, Chen D, Gan Y, Xiang T, Liu Y. Robust and privacy-preserving collaborative training: a comprehensive survey. Artificial Intelligence Review 2024;57(7) View
  75. Suh J, Lee G, Kim J, Shin J, Kim Y, Lee S, Kim S. Privacy-Preserving Prediction of Postoperative Mortality in Multi-Institutional Data: Development and Usability Study. JMIR Medical Informatics 2024;12:e56893 View
  76. Lyu L, Yu H, Ma X, Chen C, Sun L, Zhao J, Yang Q, Yu P. Privacy and Robustness in Federated Learning: Attacks and Defenses. IEEE Transactions on Neural Networks and Learning Systems 2024;35(7):8726 View
  77. Shiriaev E, Nazarov A, Kucherov N, Babenko M. Analytical Review of Confidential Artificial Intelligence: Methods and Algorithms for Deployment in Cloud Computing. Programming and Computer Software 2024;50(4):304 View
  78. Tian M, Liu J, Chen Z, Wang S. Privacy-preserving logistic regression with improved efficiency. Journal of Information Security and Applications 2024;85:103848 View
  79. Xie Q, Jiang S, Jiang L, Huang Y, Zhao Z, Khan S, Dai W, Liu Z, Wu K. Efficiency Optimization Techniques in Privacy-Preserving Federated Learning With Homomorphic Encryption: A Brief Survey. IEEE Internet of Things Journal 2024;11(14):24569 View
  80. Li R, Yamana H. Non-interactive Private Multivariate Function Evaluation using Homomorphic Table Lookup. IACR Communications in Cryptology 2024 View
  81. Marcillo P, Suntaxi G, Hernández-Álvarez M. A Privacy-Preserving Scheme for a Traffic Accident Risk Level Prediction System. Applied Sciences 2024;14(21):9876 View
  82. Shi H, Xu Y, Jiang Y, Yu H, Cui L. Efficient Asynchronous Multi-Participant Vertical Federated Learning. IEEE Transactions on Big Data 2024;10(6):940 View
  83. Geng J, Mou Y, Li Q, Li F, Beyan O, Decker S, Rong C. Improved Gradient Inversion Attacks and Defenses in Federated Learning. IEEE Transactions on Big Data 2024;10(6):839 View
  84. Lee J, Cho S, Kim S, Park S. Verifiable computation over encrypted data via MPC-in-the-head zero-knowledge proofs. International Journal of Information Security 2025;24(1) View
  85. Xia W, Li Y, Zhang L, Wu Z, Yuan X. Cascade Vertical Federated Learning Towards Straggler Mitigation and Label Privacy Over Distributed Labels. IEEE Transactions on Big Data 2024;10(6):926 View
  86. Shiriaev Е, Nazarov А, Kucherov N, Babenko М. Analytical review of confidential artificial intelligence: methods and algorithms for deployment in cloud computing. Programmirovanie 2024;(4):27 View

Books/Policy Documents

  1. Joye M, Petitcolas F. Data Privacy Management, Cryptocurrencies and Blockchain Technology. View
  2. Han K, Ki D. Topics in Cryptology – CT-RSA 2020. View
  3. Cheon J, Han K, Kim A, Kim M, Song Y. Selected Areas in Cryptography – SAC 2018. View
  4. Cheon J, Han K, Kim A, Kim M, Song Y. Advances in Cryptology – EUROCRYPT 2018. View
  5. Cheon J, Kim D, Park J. Selected Areas in Cryptography – SAC 2019. View
  6. Shaik I, Kumar Singh A, Narumanchi H, Emmadi N, Bhattachar R. Cyber Security Cryptography and Machine Learning. View
  7. Yoo J, Hwang J, Song B, Yoon J. Information Security Practice and Experience. View
  8. Laine K. Responsible Genomic Data Sharing. View
  9. Cheon J, Kim D, Kim D, Lee H, Lee K. Advances in Cryptology – ASIACRYPT 2019. View
  10. Bergamaschi F, Halevi S, Halevi T, Hunt H. Applied Cryptography and Network Security. View
  11. Kim D, Song Y. Information Security and Cryptology – ICISC 2018. View
  12. Akavia A, Leibovich M, Resheff Y, Ron R, Shahar M, Vald M. Machine Learning and Knowledge Discovery in Databases. View
  13. Zuber M, Carpov S, Sirdey R. Information and Communications Security. View
  14. Jin C, Ragab M, Aung K. Provable and Practical Security. View
  15. Jutla C, Manohar N. Advances in Cryptology – EUROCRYPT 2022. View
  16. Hallaji E, Razavi-Far R, Saif M. Federated and Transfer Learning. View
  17. Shaik I, Emmadi N, Tupsamudre H, Narumanchi H, Bhattachar R. Database and Expert Systems Applications - DEXA 2021 Workshops. View
  18. Ameur Y, Bouzefrane S, Audigier V. Emerging Trends in Cybersecurity Applications. View
  19. Trivedi D. Stabilization, Safety, and Security of Distributed Systems. View
  20. Prantl T, Engel S, Horn L, Kaiser D, Iffländer L, Bauer A, Krupitzer C, Kounev S. Information Security Practice and Experience. View
  21. Qu H, Xu G. Information and Communications Security. View
  22. Rodriguez D, Krishnan R. Data and Applications Security and Privacy XXXVII. View
  23. Rodriguez D, Krishnan R. Information Systems Security. View
  24. Tao H, Xu C, Zhang P. Tools for Design, Implementation and Verification of Emerging Information Technologies. View
  25. Ogilvie T. Topics in Cryptology – CT-RSA 2024. View
  26. Al Badawi A. Support Vector Machines - Algorithms, Optimizations, and Real-World Applications [Working Title]. View
  27. Wang D, Ma M, Liu L, Du X, Li X, Zhu B. Web Information Systems and Applications. View
  28. Adir A, Aharoni E, Drucker N, Levy R, Shaul H, Soceanu O. Homomorphic Encryption for Data Science (HE4DS). View