Maintenance Notice

Due to necessary scheduled maintenance, the JMIR Publications website will be unavailable from Monday, March 11, 2019 at 4:00 PM to 4:30 PM EST. We apologize in advance for any inconvenience this may cause you.

Who will be affected?

Citing this Article

Right click to copy or hit: ctrl+c (cmd+c on mac)

Published on 17.04.18 in Vol 6, No 2 (2018): Apr-Jun

This paper is in the following e-collection/theme issue:

Works citing "Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation"

According to Crossref, the following articles are citing this article (DOI 10.2196/medinform.8805):

(note that this is only a small subset of citations)

  1. Kim M, Lee J, Ohno-Machado L, Jiang X. Secure and Differentially Private Logistic Regression for Horizontally Distributed Data. IEEE Transactions on Information Forensics and Security 2020;15:695
    CrossRef
  2. Song BK, Yoo JS, Hong M, Yoon JW. A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms. Security and Communication Networks 2019;2019:1
    CrossRef
  3. Yang Q, Liu Y, Chen T, Tong Y. Federated Machine Learning. ACM Transactions on Intelligent Systems and Technology 2019;10(2):1
    CrossRef
  4. Peralta G, Cid-Fuentes RG, Bilbao J, Crespo PM. Homomorphic Encryption and Network Coding in IoT Architectures: Advantages and Future Challenges. Electronics 2019;8(8):827
    CrossRef
  5. Kim A, Song Y, Kim M, Lee K, Cheon JH. Logistic regression model training based on the approximate homomorphic encryption. BMC Medical Genomics 2018;11(S4)
    CrossRef
  6. Cheon JH, Kim D, Kim Y, Song Y. Ensemble Method for Privacy-Preserving Logistic Regression Based on Homomorphic Encryption. IEEE Access 2018;6:46938
    CrossRef

According to Crossref, the following books are citing this article (DOI 10.2196/medinform.8805)

:
  1. Joye M, Petitcolas F. Data Privacy Management, Cryptocurrencies and Blockchain Technology. 2019. Chapter 1:3
    CrossRef
  2. Cheon JH, Han K, Kim A, Kim M, Song Y. Selected Areas in Cryptography – SAC 2018. 2019. Chapter 16:347
    CrossRef
  3. Bergamaschi F, Halevi S, Halevi TT, Hunt H. Applied Cryptography and Network Security. 2019. Chapter 29:592
    CrossRef
  4. Kim D, Song Y. Information Security and Cryptology – ICISC 2018. 2019. Chapter 6:85
    CrossRef
  5. Cheon JH, Han K, Kim A, Kim M, Song Y. Advances in Cryptology – EUROCRYPT 2018. 2018. Chapter 14:360
    CrossRef