Published on in Vol 6, No 2 (2018): Apr-Jun

Preprints (earlier versions) of this paper are available at https://preprints.jmir.org/preprint/8805, first published .
Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation

Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation

Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation

Journals

  1. Sim J, Chan F, Chen S, Meng Tan B, Mi Aung K. Achieving GWAS with homomorphic encryption. BMC Medical Genomics 2020;13(S7) View
  2. Kim M, Song Y, Li B, Micciancio D. Semi-Parallel logistic regression for GWAS on encrypted data. BMC Medical Genomics 2020;13(S7) View
  3. Kim M, Lee J, Ohno-Machado L, Jiang X. Secure and Differentially Private Logistic Regression for Horizontally Distributed Data. IEEE Transactions on Information Forensics and Security 2020;15:695 View
  4. Kang J. Some Properties and Distribution of the Zeros of the q-Sigmoid Polynomials. Discrete Dynamics in Nature and Society 2020;2020:1 View
  5. Kim A, Song Y, Kim M, Lee K, Cheon J. Logistic regression model training based on the approximate homomorphic encryption. BMC Medical Genomics 2018;11(S4) View
  6. Peralta G, Cid-Fuentes R, Bilbao J, Crespo P. Homomorphic Encryption and Network Coding in IoT Architectures: Advantages and Future Challenges. Electronics 2019;8(8):827 View
  7. Li J, Kuang X, Lin S, Ma X, Tang Y. Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Information Sciences 2020;526:166 View
  8. Xie Y, Wang H, Yu B, Zhang C. Secure collaborative few-shot learning. Knowledge-Based Systems 2020;203:106157 View
  9. Song B, Yoo J, Hong M, Yoon J. A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms. Security and Communication Networks 2019;2019:1 View
  10. Kim D, Son Y, Kim D, Kim A, Hong S, Cheon J. Privacy-preserving approximate GWAS computation based on homomorphic encryption. BMC Medical Genomics 2020;13(S7) View
  11. Froelicher D, Troncoso-Pastoriza J, Sousa J, Hubaux J. Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets. IEEE Transactions on Information Forensics and Security 2020;15:3035 View
  12. Lee Y, Lee J, Kim Y, No J. Near-Optimal Polynomial for Modulus Reduction Using L2-Norm for Approximate Homomorphic Encryption. IEEE Access 2020;8:144321 View
  13. Cheon J, Kim D, Kim Y, Song Y. Ensemble Method for Privacy-Preserving Logistic Regression Based on Homomorphic Encryption. IEEE Access 2018;6:46938 View
  14. Yang Q, Liu Y, Chen T, Tong Y. Federated Machine Learning. ACM Transactions on Intelligent Systems and Technology 2019;10(2):1 View
  15. Blatt M, Gusev A, Polyakov Y, Rohloff K, Vaikuntanathan V. Optimized homomorphic encryption solution for secure genome-wide association studies. BMC Medical Genomics 2020;13(S7) View
  16. Zhu R, Jiang C, Wang X, Wang S, Zheng H, Tang H. Privacy-preserving construction of generalized linear mixed model for biomedical computation. Bioinformatics 2020;36(Supplement_1):i128 View
  17. Tran N, Prodan I, Grøtli E, Lefèvre L. Safe navigation in a coastal environment of multiple surface vehicles under uncertainties: A combined use of potential field constructions and NMPC. Ocean Engineering 2020;216:107706 View
  18. Lu Y, Zhou T, Tian Y, Zhu S, Li J. Web-Based Privacy-Preserving Multicenter Medical Data Analysis Tools Via Threshold Homomorphic Encryption: Design and Development Study. Journal of Medical Internet Research 2020;22(12):e22555 View
  19. Badawi A, Hoang L, Mun C, Laine K, Aung K. PrivFT: Private and Fast Text Classification With Homomorphic Encryption. IEEE Access 2020;8:226544 View
  20. Tan Z, Zhang H, Hu P, Gao R, Anees A. Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties. Security and Communication Networks 2021;2021:1 View
  21. Lee T, Lee J, Jun C. Bilingual autoencoder-based efficient harmonization of multi-source private data for accurate predictive modeling. Information Sciences 2021;568:403 View
  22. Yu C, Ding Z, Chen X. HOPE: Software Defect Prediction Model Construction Method via Homomorphic Encryption. IEEE Access 2021;9:69405 View
  23. Al Badawi A, Polyakov Y, Aung K, Veeravalli B, Rohloff K. Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme. IEEE Transactions on Emerging Topics in Computing 2021;9(2):941 View
  24. Lu Y, Tian Y, Zhou T, Zhu S, Li J. Multicenter Privacy-Preserving Cox Analysis Based on Homomorphic Encryption. IEEE Journal of Biomedical and Health Informatics 2021;25(9):3310 View
  25. Zhang B. Classification of Encrypted Text Based on Artificial Intelligence. IOP Conference Series: Materials Science and Engineering 2020;740(1):012133 View
  26. Torkzadehmahani R, Nasirigerdeh R, Blumenthal D, Kacprowski T, List M, Matschinske J, Spaeth J, Wenke N, Baumbach J. Privacy-Preserving Artificial Intelligence Techniques in Biomedicine. Methods of Information in Medicine 2022;61(S 01):e12 View
  27. Sav S, Bossuat J, Troncoso-Pastoriza J, Claassen M, Hubaux J. Privacy-preserving federated neural network learning for disease-associated cell classification. Patterns 2022;3(5):100487 View
  28. Liu Y, Liu Y, Liu Z, Liang Y, Meng C, Zhang J, Zheng Y. Federated Forest. IEEE Transactions on Big Data 2022;8(3):843 View
  29. Chen Z, Hu G, Zheng M, Song X, Chen L. Bibliometrics of Machine Learning Research Using Homomorphic Encryption. Mathematics 2021;9(21):2792 View
  30. Nguyen L, Sigg S, Lietzen J, Findling R, Ruttik K. Camouflage Learning: Feature Value Obscuring Ambient Intelligence for Constrained Devices. IEEE Transactions on Mobile Computing 2023;22(2):781 View
  31. Gaurav A, Psannis K, Peraković D. Security of Cloud-Based Medical Internet of Things (MIoTs). International Journal of Software Science and Computational Intelligence 2021;14(1):1 View
  32. Bharati S, Mondal M, Podder P, Prasath V. Federated learning: Applications, challenges and future directions. International Journal of Hybrid Intelligent Systems 2022;18(1-2):19 View
  33. Hong S, Park J, Cho W, Choe H, Cheon J. Secure tumor classification by shallow neural network using homomorphic encryption. BMC Genomics 2022;23(1) View
  34. Zhao R, Xie Y, Jia X, Wang H, Kumar N, Aswani Kumar C. Practical Privacy Preserving-Aided Disease Diagnosis with Multiclass SVM in an Outsourced Environment. Security and Communication Networks 2022;2022:1 View
  35. Sabry F, Eltaras T, Labda W, Alzoubi K, Malluhi Q, Wu Y. Machine Learning for Healthcare Wearable Devices: The Big Picture. Journal of Healthcare Engineering 2022;2022:1 View
  36. Yu X, Zhao W, Huang Y, Ren J, Tang D, He D. Privacy-Preserving Outsourced Logistic Regression on Encrypted Data from Homomorphic Encryption. Security and Communication Networks 2022;2022:1 View
  37. Yoo J, Yoon J, Son J. t-BMPNet: Trainable Bitwise Multilayer Perceptron Neural Network over Fully Homomorphic Encryption Scheme. Security and Communication Networks 2021;2021:1 View
  38. Dang T, Lan X, Weng J, Feng M. Federated Learning for Electronic Health Records. ACM Transactions on Intelligent Systems and Technology 2022;13(5):1 View
  39. Zhou Y, Song L, Liu Y, Vijayakumar P, Gupta B, Alhalabi W, Alsharif H. A privacy-preserving logistic regression-based diagnosis scheme for digital healthcare. Future Generation Computer Systems 2023;144:63 View
  40. Edemacu K, Kim J. Scalable Multi-Party Privacy-Preserving Gradient Tree Boosting over Vertically Partitioned Dataset with Outsourced Computations. Mathematics 2022;10(13):2185 View
  41. Ishimaki Y, Yamana H. Faster Homomorphic Trace-Type Function Evaluation. IEEE Access 2021;9:53061 View
  42. Topaloglu M, Morrell E, Rajendran S, Topaloglu U. In the Pursuit of Privacy: The Promises and Predicaments of Federated Learning in Healthcare. Frontiers in Artificial Intelligence 2021;4 View
  43. Koklu M, Kursun R, Taspinar Y, Cinar I, Torres J. Classification of Date Fruits into Genetic Varieties Using Image Analysis. Mathematical Problems in Engineering 2021;2021:1 View
  44. Zhao J, Wang W, Wang D, Wang X, Mu C. PMHE: a wearable medical sensor assisted framework for health care based on blockchain and privacy computing. Journal of Cloud Computing 2022;11(1) View
  45. Cheon J, Kim W, Park J. Efficient Homomorphic Evaluation on Large Intervals. IEEE Transactions on Information Forensics and Security 2022;17:2553 View
  46. Ryoo C, Kang J. Several Types of q-Differential Equations of Higher Order and Properties of Their Solutions. Mathematics 2022;10(23):4469 View
  47. Ghavamipour A, Turkmen F, Jiang X. Privacy-preserving logistic regression with secret sharing. BMC Medical Informatics and Decision Making 2022;22(1) View
  48. Zheng M, Ju L, Jiang L. CoFHE: Software and hardware Co-design for FHE-based machine learning as a service. Frontiers in Electronics 2023;3 View
  49. Hong S, Kim S, Choi J, Lee Y, Cheon J. Efficient Sorting of Homomorphic Encrypted Data With k-Way Sorting Network. IEEE Transactions on Information Forensics and Security 2021;16:4389 View
  50. Qayyum A, Qadir J, Bilal M, Al-Fuqaha A. Secure and Robust Machine Learning for Healthcare: A Survey. IEEE Reviews in Biomedical Engineering 2021;14:156 View
  51. Jia H, Aldeen M, Zhao C, Jing S, Chen Z. Flexible privacy‐preserving machine learning: When searchable encryption meets homomorphic encryption. International Journal of Intelligent Systems 2022;37(11):9173 View
  52. Gao C, Li J, Xia S, Choo K, Lou W, Dong C. MAS-Encryption and its Applications in Privacy-Preserving Classifiers. IEEE Transactions on Knowledge and Data Engineering 2022;34(5):2306 View
  53. Babenko M, Tchernykh A, Pulido-Gaytan B, Avetisyan A, Nesmachnow S, Wang X, Granelli F. Towards the Sign Function Best Approximation for Secure Outsourced Computations and Control. Mathematics 2022;10(12):2006 View
  54. Babenko M, Golimblevskaia E, Tchernykh A, Shiriaev E, Ermakova T, Pulido-Gaytan L, Valuev G, Avetisyan A, Gagloeva L. A Comparative Study of Secure Outsourced Matrix Multiplication Based on Homomorphic Encryption. Big Data and Cognitive Computing 2023;7(2):84 View
  55. Zhang Y, Wu Y, Li T, Zhou H, Chen Y. Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing. Computer Modeling in Engineering & Sciences 2023;137(1):345 View
  56. Zhou J, Wu N, Wang Y, Gu S, Cao Z, Dong X, Choo K. A Differentially Private Federated Learning Model against Poisoning Attacks in Edge Computing. IEEE Transactions on Dependable and Secure Computing 2022:1 View
  57. Arazzi M, Nicolazzo S, Nocera A. A Fully Privacy-Preserving Solution for Anomaly Detection in IoT using Federated Learning and Homomorphic Encryption. Information Systems Frontiers 2025;27(1):367 View
  58. Ge S, Feng D, Song S, Wang J, Huang X. Sparse Logistic Regression-Based One-Bit SAR Imaging. IEEE Transactions on Geoscience and Remote Sensing 2023;61:1 View
  59. Pulido-Gaytan B, Tchernykh A, Leprévost F, Bouvry P, Goldman A. Toward Understanding Efficient Privacy-Preserving Homomorphic Comparison. IEEE Access 2023;11:102189 View
  60. Zheng Y, Xu S, Wang S, Gao Y, Hua Z. Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables. IEEE Transactions on Services Computing 2023;16(5):3604 View
  61. Wang J, Pal A, Yang Q, Kant K, Zhu K, Guo S. Collaborative Machine Learning: Schemes, Robustness, and Privacy. IEEE Transactions on Neural Networks and Learning Systems 2023;34(12):9625 View
  62. Jiasen L, An W, Guofeng L, Dan Y, Jindan Z. Improved secure PCA and LDA algorithms for intelligent computing in IoT‐to‐cloud setting. Computational Intelligence 2024;40(1) View
  63. Huang Y, Wang W, Zhao X, Wang Y, Feng X, He H, Yao M. EFMVFL: An Efficient and Flexible Multi-party Vertical Federated Learning without a Third Party. ACM Transactions on Knowledge Discovery from Data 2024;18(3):1 View
  64. Yang W, Kang P, Wei C. MS-FL: A Federated Learning Framework Based on Multiple Security Strategies. IEEE Access 2024;12:8912 View
  65. Divakar Allavarpu V, Naresh V, Krishna Mohan A. Privacy‐preserving credit risk analysis based on homomorphic encryption aware logistic regression in the cloud. SECURITY AND PRIVACY 2024;7(3) View
  66. Wang J, Li J. Blockchain and Access Control Encryption-Empowered IoT Knowledge Sharing for Cloud-Edge Orchestrated Personalized Privacy-Preserving Federated Learning. Applied Sciences 2024;14(5):1743 View
  67. Sharma A, Marchang N. A review on client-server attacks and defenses in federated learning. Computers & Security 2024;140:103801 View
  68. Hallaji E, Razavi-Far R, Saif M, Wang B, Yang Q. Decentralized Federated Learning: A Survey on Security and Privacy. IEEE Transactions on Big Data 2024;10(2):194 View
  69. Bataa M, Song S, Park K, Kim M, Cheon J, Kim S. Finding Highly Similar Regions of Genomic Sequences Through Homomorphic Encryption. Journal of Computational Biology 2024;31(3):197 View
  70. Liu S, Luo J, Zhang Y, Wang H, Yu Y, Xu Z. Efficient privacy-preserving Gaussian process via secure multi-party computation. Journal of Systems Architecture 2024;151:103134 View
  71. Wang H, Chen T, Ding Y, Wang Y, Yang C. Privacy-preserving multi-party logistic regression in cloud computing. Computer Standards & Interfaces 2024;90:103857 View
  72. Jiang H, Shang S, Liu P, Yi T. A fault‐tolerant and scalable boosting method over vertically partitioned data. CAAI Transactions on Intelligence Technology 2024;9(5):1092 View
  73. Sun P, Cai C, Zhang Y, Yip D, Esmradi A. A confidentiality preserved data sharing framework for decision support in the maritime law enforcement. Marine Policy 2024;167:106244 View
  74. Yang F, Zhang X, Guo S, Chen D, Gan Y, Xiang T, Liu Y. Robust and privacy-preserving collaborative training: a comprehensive survey. Artificial Intelligence Review 2024;57(7) View
  75. Suh J, Lee G, Kim J, Shin J, Kim Y, Lee S, Kim S. Privacy-Preserving Prediction of Postoperative Mortality in Multi-Institutional Data: Development and Usability Study. JMIR Medical Informatics 2024;12:e56893 View
  76. Lyu L, Yu H, Ma X, Chen C, Sun L, Zhao J, Yang Q, Yu P. Privacy and Robustness in Federated Learning: Attacks and Defenses. IEEE Transactions on Neural Networks and Learning Systems 2024;35(7):8726 View
  77. Shiriaev E, Nazarov A, Kucherov N, Babenko M. Analytical Review of Confidential Artificial Intelligence: Methods and Algorithms for Deployment in Cloud Computing. Programming and Computer Software 2024;50(4):304 View
  78. Tian M, Liu J, Chen Z, Wang S. Privacy-preserving logistic regression with improved efficiency. Journal of Information Security and Applications 2024;85:103848 View
  79. Xie Q, Jiang S, Jiang L, Huang Y, Zhao Z, Khan S, Dai W, Liu Z, Wu K. Efficiency Optimization Techniques in Privacy-Preserving Federated Learning With Homomorphic Encryption: A Brief Survey. IEEE Internet of Things Journal 2024;11(14):24569 View
  80. Li R, Yamana H. Non-interactive Private Multivariate Function Evaluation using Homomorphic Table Lookup. IACR Communications in Cryptology 2024 View
  81. Marcillo P, Suntaxi G, Hernández-Álvarez M. A Privacy-Preserving Scheme for a Traffic Accident Risk Level Prediction System. Applied Sciences 2024;14(21):9876 View
  82. Shi H, Xu Y, Jiang Y, Yu H, Cui L. Efficient Asynchronous Multi-Participant Vertical Federated Learning. IEEE Transactions on Big Data 2024;10(6):940 View
  83. Geng J, Mou Y, Li Q, Li F, Beyan O, Decker S, Rong C. Improved Gradient Inversion Attacks and Defenses in Federated Learning. IEEE Transactions on Big Data 2024;10(6):839 View
  84. Lee J, Cho S, Kim S, Park S. Verifiable computation over encrypted data via MPC-in-the-head zero-knowledge proofs. International Journal of Information Security 2025;24(1) View
  85. Xia W, Li Y, Zhang L, Wu Z, Yuan X. Cascade Vertical Federated Learning Towards Straggler Mitigation and Label Privacy Over Distributed Labels. IEEE Transactions on Big Data 2024;10(6):926 View
  86. Shiriaev Е, Nazarov А, Kucherov N, Babenko М. Analytical review of confidential artificial intelligence: methods and algorithms for deployment in cloud computing. Programmirovanie 2024;(4):27 View
  87. Yuan J, Liu W, Shi J, Li Q. Approximate homomorphic encryption based privacy-preserving machine learning: a survey. Artificial Intelligence Review 2025;58(3) View
  88. Barbosa P, Amorim I, Maia E, Praça I. ENNigma: A framework for Private Neural Networks. Future Generation Computer Systems 2025;166:107719 View
  89. Chen Q, Li H, Ariffin S, Mustapa N. A Comprehensive Study on the Homomorphic Encryption for Secure Image Data Processing. Engineering, Technology & Applied Science Research 2025;15(2):21783 View
  90. Lee C, Lim K, Eswaran S. A comprehensive survey on secure healthcare data processing with homomorphic encryption: attacks and defenses. Discover Public Health 2025;22(1) View
  91. Blika A, Palmos S, Doukas G, Lamprou V, Pelekis S, Kontoulis M, Ntanos C, Askounis D. Federated Learning for Enhanced Cybersecurity and Trustworthiness in 5G and 6G Networks: A Comprehensive Survey. IEEE Open Journal of the Communications Society 2025;6:3094 View

Books/Policy Documents

  1. Joye M, Petitcolas F. Data Privacy Management, Cryptocurrencies and Blockchain Technology. View
  2. Han K, Ki D. Topics in Cryptology – CT-RSA 2020. View
  3. Cheon J, Han K, Kim A, Kim M, Song Y. Selected Areas in Cryptography – SAC 2018. View
  4. Cheon J, Han K, Kim A, Kim M, Song Y. Advances in Cryptology – EUROCRYPT 2018. View
  5. Cheon J, Kim D, Park J. Selected Areas in Cryptography – SAC 2019. View
  6. Shaik I, Kumar Singh A, Narumanchi H, Emmadi N, Bhattachar R. Cyber Security Cryptography and Machine Learning. View
  7. Yoo J, Hwang J, Song B, Yoon J. Information Security Practice and Experience. View
  8. Laine K. Responsible Genomic Data Sharing. View
  9. Cheon J, Kim D, Kim D, Lee H, Lee K. Advances in Cryptology – ASIACRYPT 2019. View
  10. Bergamaschi F, Halevi S, Halevi T, Hunt H. Applied Cryptography and Network Security. View
  11. Kim D, Song Y. Information Security and Cryptology – ICISC 2018. View
  12. Akavia A, Leibovich M, Resheff Y, Ron R, Shahar M, Vald M. Machine Learning and Knowledge Discovery in Databases. View
  13. Zuber M, Carpov S, Sirdey R. Information and Communications Security. View
  14. Jin C, Ragab M, Aung K. Provable and Practical Security. View
  15. Jutla C, Manohar N. Advances in Cryptology – EUROCRYPT 2022. View
  16. Hallaji E, Razavi-Far R, Saif M. Federated and Transfer Learning. View
  17. Shaik I, Emmadi N, Tupsamudre H, Narumanchi H, Bhattachar R. Database and Expert Systems Applications - DEXA 2021 Workshops. View
  18. Ameur Y, Bouzefrane S, Audigier V. Emerging Trends in Cybersecurity Applications. View
  19. Trivedi D. Stabilization, Safety, and Security of Distributed Systems. View
  20. Prantl T, Engel S, Horn L, Kaiser D, Iffländer L, Bauer A, Krupitzer C, Kounev S. Information Security Practice and Experience. View
  21. Qu H, Xu G. Information and Communications Security. View
  22. Rodriguez D, Krishnan R. Data and Applications Security and Privacy XXXVII. View
  23. Rodriguez D, Krishnan R. Information Systems Security. View
  24. Tao H, Xu C, Zhang P. Tools for Design, Implementation and Verification of Emerging Information Technologies. View
  25. Ogilvie T. Topics in Cryptology – CT-RSA 2024. View
  26. Al Badawi A. Federated Learning - A Systematic Review. View
  27. Wang D, Ma M, Liu L, Du X, Li X, Zhu B. Web Information Systems and Applications. View
  28. Adir A, Aharoni E, Drucker N, Levy R, Shaul H, Soceanu O. Homomorphic Encryption for Data Science (HE4DS). View
  29. Pradeep Kumar Reddy B, Chatterjee A. Proceedings of International Conference on Network Security and Blockchain Technology. View

Conference Proceedings

  1. Nandakumar K, Ratha N, Pankanti S, Halevi S. 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). Towards Deep Neural Network Training on Encrypted Data View
  2. Chen H, Dai W, Kim M, Song Y. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference View
  3. Talbi R. 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S). Towards Practical Privacy-Preserving Collaborative Machine Learning at a Scale View
  4. Zhang Y, Ma C, Dong J, Xia E, Hao B, Mei J, Qin Y, Li S, Sun W, Zhang Z, Du X. 2019 IEEE International Conference on Healthcare Informatics (ICHI). Insight Ease: A System for Automated Data-driven Healthcare Insight Generation View
  5. Mandal K, Gong G. Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop. PrivFL View
  6. Curtis B, Player R. Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography. On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption View
  7. Jiang X, Kim M, Lauter K, Song Y. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Secure Outsourced Matrix Computation and Application to Neural Networks View
  8. Thorakkattu Madathil N, Harous S. 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). Central versus Distributed Statistical Computing Algorithms-A Comparison View
  9. Iezzi M. 2020 IEEE International Conference on Big Data (Big Data). Practical Privacy-Preserving Data Science With Homomorphic Encryption: An Overview View
  10. Sigg S, Nguyen L, Ma J. 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops). Camouflage Learning View
  11. Guo H, Dolhansky B, Hsin E, Dinh P, Ferrer C, Wang S. 2021 IEEE Winter Conference on Applications of Computer Vision (WACV). Deep Poisoning: Towards Robust Image Data Sharing against Visual Disclosure View
  12. Song Y, Xie Y, Zhang H, Liang Y, Ye X, Yang A, Ouyang Y. 2021 IEEE 21st International Conference on Communication Technology (ICCT). Federated Learning Application on Telecommunication-Joint Healthcare Recommendation View
  13. M A. 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). Privacy Preservation using Federated Learning and Homomorphic Encryption: A Study View
  14. Chen Z, Cai M, Wang Z. 2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS). Research on privacy fraud detection of Logistic regression based on homomorphic encryption View
  15. Zhou J, Mi B, Huang D, Liu Y, Li Y, Weng Y. 2021 CAA Symposium on Fault Detection, Supervision, and Safety for Technical Processes (SAFEPROCESS). Privacy-preserving Machine Learning Based on Homomorphic Conjugate Search Problem View
  16. Chakrapani K, Malathi P, Iniyan U, Thiagarajan R, Padmapriya S, Krishnamoorthy R. 2022 8th International Conference on Smart Structures and Systems (ICSSS). Regressive Based Classifier Analytics for the Mechanism of CryptoSystems Security Using EHE Scheme View
  17. Kim W, Seok J. 2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). Privacy-preserving collaborative machine learning in biomedical applications View
  18. Tian H, Zeng C, Ren Z, Chai D, Zhang J, Chen K, Yang Q. 2022 IEEE Symposium on Security and Privacy (SP). Sphinx: Enabling Privacy-Preserving Online Learning over the Cloud View
  19. Podschwadt R, Takabi D. 2021 IEEE 14th International Conference on Cloud Computing (CLOUD). Non-interactive Privacy Preserving Recurrent Neural Network Prediction with Homomorphic Encryption View
  20. Liu C, Jiang Z, Zhao X, Chen Q, Fang J, He D, Zhang J, Wang X. IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption View
  21. Zhu T, Liao C, Guo L, Zhou Z, Ruan W, Wang W, Li X, Zhang Q, Zheng H, Wang S, Liu Y. 2022 IEEE 7th International Conference on Smart Cloud (SmartCloud). Detecting and Warning Abnormal Transaction of Virtual Cryptocurrency Based on Privacy Protection Framework View
  22. Chitrapu P, Kalluri H. 2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS). A Survey on Homomorphic Encryption for Biometrics Template Security Based on Machine Learning Models View
  23. Tian M, Li H, Huang J, Liang J, Bu W, Chen B. Proceedings of the 2022 6th International Conference on Computer Science and Artificial Intelligence. Credit Risk Models using Rule-Based Methods and Machine-Learning Algorithms View
  24. Zheng M, Chen F, Jiang L, Lou Q. 2023 24th International Symposium on Quality Electronic Design (ISQED). PriML: An Electro-Optical Accelerator for Private Machine Learning on Encrypted Data View
  25. Zhang Y, Tang L, Che L, Liu C, Li E, Xing H, Zhang J, Di G. 2023 International Conference on Networking and Network Applications (NaNA). Privacy-Preserving Multi-User Joint Data Logistic Regression Inference Scheme View
  26. Mittal S, Singh S. 2023 IEEE 4th Annual Flagship India Council International Subsections Conference (INDISCON). Data Analytics over Encrypted Data from Fully Homomorphic Encryption View
  27. Feng X, Li X, Zhou S, Jin X. 2023 IEEE Conference on Communications and Network Security (CNS). Homomorphic Comparison Method Based on Dynamically Polynomial Composite Approximating Sign Function View
  28. Akavia A, Galili B, Shaul H, Weiss M, Yakhini Z. 2023 IEEE 36th Computer Security Foundations Symposium (CSF). Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE View
  29. Hwang I, Seo J, Song Y. Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. Optimizing HE operations via Level-aware Key-switching Framework View
  30. Shi Y, Song H, Xu J. 2023 62nd IEEE Conference on Decision and Control (CDC). Responsible and Effective Federated Learning in Financial Services: A Comprehensive Survey View
  31. Rodriguez D, Krishnan R. 2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). Learnable Image Transformations for Privacy Enhanced Deep Neural Networks View
  32. Song C, Zhan W, Shi X. 2024 IEEE 12th International Conference on Healthcare Informatics (ICHI). SparseHE: An Efficient Privacy-Preserving Biomedical Prediction Approach Using Sparse Homomorphic Encryption View
  33. Gogoi P, Valan J. 2024 2nd World Conference on Communication & Computing (WCONF). Application of Homomorphic Encryption in Machine Learning Based Chronic Kidney Disease Prediction View
  34. Khan M, Fang B, Cimino G, Cirillo S, Yang L, Zhao D. 2024 IEEE International Conference on Web Services (ICWS). Privacy-Preserving Artificial Intelligence on Edge Devices: A Homomorphic Encryption Approach View
  35. Li W, Song Y, Wang S. 2024 IEEE 15th International Conference on Software Engineering and Service Science (ICSESS). Personal Credit Evaluation Model Based on Homomorphic Encryption View
  36. Mahatho M, Chen Y, Zhang S. 2024 16th International Conference on Wireless Communications and Signal Processing (WCSP). Performance Analysis of Machine Learning on Homomorphically Encrypted Data View
  37. Adamek J, Binfet P, Schlüter N, Darup M. 2024 IEEE 63rd Conference on Decision and Control (CDC). Encrypted system identification as-a-service via reliable encrypted matrix inversion View
  38. Wang J, Hou J, Zhang F, Meng Y, Su Y, Yang C. Proceedings of the 30th Asia and South Pacific Design Automation Conference. Low Multiplicative Depth Polynomial Evaluation Architectures for Homomorphic Encrypted Data View