Published on in Vol 6, No 2 (2018): Apr-Jun
Preprints (earlier versions) of this paper are
available at
https://preprints.jmir.org/preprint/8805, first published
.
Journals
- Sim J, Chan F, Chen S, Meng Tan B, Mi Aung K. Achieving GWAS with homomorphic encryption. BMC Medical Genomics 2020;13(S7) View
- Kim M, Song Y, Li B, Micciancio D. Semi-Parallel logistic regression for GWAS on encrypted data. BMC Medical Genomics 2020;13(S7) View
- Kim M, Lee J, Ohno-Machado L, Jiang X. Secure and Differentially Private Logistic Regression for Horizontally Distributed Data. IEEE Transactions on Information Forensics and Security 2020;15:695 View
- Kang J. Some Properties and Distribution of the Zeros of the q-Sigmoid Polynomials. Discrete Dynamics in Nature and Society 2020;2020:1 View
- Kim A, Song Y, Kim M, Lee K, Cheon J. Logistic regression model training based on the approximate homomorphic encryption. BMC Medical Genomics 2018;11(S4) View
- Peralta G, Cid-Fuentes R, Bilbao J, Crespo P. Homomorphic Encryption and Network Coding in IoT Architectures: Advantages and Future Challenges. Electronics 2019;8(8):827 View
- Li J, Kuang X, Lin S, Ma X, Tang Y. Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Information Sciences 2020;526:166 View
- Xie Y, Wang H, Yu B, Zhang C. Secure collaborative few-shot learning. Knowledge-Based Systems 2020;203:106157 View
- Song B, Yoo J, Hong M, Yoon J. A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms. Security and Communication Networks 2019;2019:1 View
- Kim D, Son Y, Kim D, Kim A, Hong S, Cheon J. Privacy-preserving approximate GWAS computation based on homomorphic encryption. BMC Medical Genomics 2020;13(S7) View
- Froelicher D, Troncoso-Pastoriza J, Sousa J, Hubaux J. Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets. IEEE Transactions on Information Forensics and Security 2020;15:3035 View
- Lee Y, Lee J, Kim Y, No J. Near-Optimal Polynomial for Modulus Reduction Using L2-Norm for Approximate Homomorphic Encryption. IEEE Access 2020;8:144321 View
- Cheon J, Kim D, Kim Y, Song Y. Ensemble Method for Privacy-Preserving Logistic Regression Based on Homomorphic Encryption. IEEE Access 2018;6:46938 View
- Yang Q, Liu Y, Chen T, Tong Y. Federated Machine Learning. ACM Transactions on Intelligent Systems and Technology 2019;10(2):1 View
- Blatt M, Gusev A, Polyakov Y, Rohloff K, Vaikuntanathan V. Optimized homomorphic encryption solution for secure genome-wide association studies. BMC Medical Genomics 2020;13(S7) View
- Zhu R, Jiang C, Wang X, Wang S, Zheng H, Tang H. Privacy-preserving construction of generalized linear mixed model for biomedical computation. Bioinformatics 2020;36(Supplement_1):i128 View
- Tran N, Prodan I, Grøtli E, Lefèvre L. Safe navigation in a coastal environment of multiple surface vehicles under uncertainties: A combined use of potential field constructions and NMPC. Ocean Engineering 2020;216:107706 View
- Lu Y, Zhou T, Tian Y, Zhu S, Li J. Web-Based Privacy-Preserving Multicenter Medical Data Analysis Tools Via Threshold Homomorphic Encryption: Design and Development Study. Journal of Medical Internet Research 2020;22(12):e22555 View
- Badawi A, Hoang L, Mun C, Laine K, Aung K. PrivFT: Private and Fast Text Classification With Homomorphic Encryption. IEEE Access 2020;8:226544 View
- Tan Z, Zhang H, Hu P, Gao R, Anees A. Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties. Security and Communication Networks 2021;2021:1 View
- Lee T, Lee J, Jun C. Bilingual autoencoder-based efficient harmonization of multi-source private data for accurate predictive modeling. Information Sciences 2021;568:403 View
- Yu C, Ding Z, Chen X. HOPE: Software Defect Prediction Model Construction Method via Homomorphic Encryption. IEEE Access 2021;9:69405 View
- Al Badawi A, Polyakov Y, Aung K, Veeravalli B, Rohloff K. Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme. IEEE Transactions on Emerging Topics in Computing 2021;9(2):941 View
- Lu Y, Tian Y, Zhou T, Zhu S, Li J. Multicenter Privacy-Preserving Cox Analysis Based on Homomorphic Encryption. IEEE Journal of Biomedical and Health Informatics 2021;25(9):3310 View
- Zhang B. Classification of Encrypted Text Based on Artificial Intelligence. IOP Conference Series: Materials Science and Engineering 2020;740(1):012133 View
- Torkzadehmahani R, Nasirigerdeh R, Blumenthal D, Kacprowski T, List M, Matschinske J, Spaeth J, Wenke N, Baumbach J. Privacy-Preserving Artificial Intelligence Techniques in Biomedicine. Methods of Information in Medicine 2022;61(S 01):e12 View
- Sav S, Bossuat J, Troncoso-Pastoriza J, Claassen M, Hubaux J. Privacy-preserving federated neural network learning for disease-associated cell classification. Patterns 2022;3(5):100487 View
- Liu Y, Liu Y, Liu Z, Liang Y, Meng C, Zhang J, Zheng Y. Federated Forest. IEEE Transactions on Big Data 2022;8(3):843 View
- Chen Z, Hu G, Zheng M, Song X, Chen L. Bibliometrics of Machine Learning Research Using Homomorphic Encryption. Mathematics 2021;9(21):2792 View
- Nguyen L, Sigg S, Lietzen J, Findling R, Ruttik K. Camouflage Learning: Feature Value Obscuring Ambient Intelligence for Constrained Devices. IEEE Transactions on Mobile Computing 2023;22(2):781 View
- Gaurav A, Psannis K, Peraković D. Security of Cloud-Based Medical Internet of Things (MIoTs). International Journal of Software Science and Computational Intelligence 2021;14(1):1 View
- Bharati S, Mondal M, Podder P, Prasath V. Federated learning: Applications, challenges and future directions. International Journal of Hybrid Intelligent Systems 2022;18(1-2):19 View
- Hong S, Park J, Cho W, Choe H, Cheon J. Secure tumor classification by shallow neural network using homomorphic encryption. BMC Genomics 2022;23(1) View
- Zhao R, Xie Y, Jia X, Wang H, Kumar N, Aswani Kumar C. Practical Privacy Preserving-Aided Disease Diagnosis with Multiclass SVM in an Outsourced Environment. Security and Communication Networks 2022;2022:1 View
- Sabry F, Eltaras T, Labda W, Alzoubi K, Malluhi Q, Wu Y. Machine Learning for Healthcare Wearable Devices: The Big Picture. Journal of Healthcare Engineering 2022;2022:1 View
- Yu X, Zhao W, Huang Y, Ren J, Tang D, He D. Privacy-Preserving Outsourced Logistic Regression on Encrypted Data from Homomorphic Encryption. Security and Communication Networks 2022;2022:1 View
- Yoo J, Yoon J, Son J. t-BMPNet: Trainable Bitwise Multilayer Perceptron Neural Network over Fully Homomorphic Encryption Scheme. Security and Communication Networks 2021;2021:1 View
- Dang T, Lan X, Weng J, Feng M. Federated Learning for Electronic Health Records. ACM Transactions on Intelligent Systems and Technology 2022;13(5):1 View
- Zhou Y, Song L, Liu Y, Vijayakumar P, Gupta B, Alhalabi W, Alsharif H. A privacy-preserving logistic regression-based diagnosis scheme for digital healthcare. Future Generation Computer Systems 2023;144:63 View
- Edemacu K, Kim J. Scalable Multi-Party Privacy-Preserving Gradient Tree Boosting over Vertically Partitioned Dataset with Outsourced Computations. Mathematics 2022;10(13):2185 View
- Ishimaki Y, Yamana H. Faster Homomorphic Trace-Type Function Evaluation. IEEE Access 2021;9:53061 View
- Topaloglu M, Morrell E, Rajendran S, Topaloglu U. In the Pursuit of Privacy: The Promises and Predicaments of Federated Learning in Healthcare. Frontiers in Artificial Intelligence 2021;4 View
- Koklu M, Kursun R, Taspinar Y, Cinar I, Torres J. Classification of Date Fruits into Genetic Varieties Using Image Analysis. Mathematical Problems in Engineering 2021;2021:1 View
- Zhao J, Wang W, Wang D, Wang X, Mu C. PMHE: a wearable medical sensor assisted framework for health care based on blockchain and privacy computing. Journal of Cloud Computing 2022;11(1) View
- Cheon J, Kim W, Park J. Efficient Homomorphic Evaluation on Large Intervals. IEEE Transactions on Information Forensics and Security 2022;17:2553 View
- Ryoo C, Kang J. Several Types of q-Differential Equations of Higher Order and Properties of Their Solutions. Mathematics 2022;10(23):4469 View
- Ghavamipour A, Turkmen F, Jiang X. Privacy-preserving logistic regression with secret sharing. BMC Medical Informatics and Decision Making 2022;22(1) View
- Zheng M, Ju L, Jiang L. CoFHE: Software and hardware Co-design for FHE-based machine learning as a service. Frontiers in Electronics 2023;3 View
- Hong S, Kim S, Choi J, Lee Y, Cheon J. Efficient Sorting of Homomorphic Encrypted Data With k-Way Sorting Network. IEEE Transactions on Information Forensics and Security 2021;16:4389 View
- Qayyum A, Qadir J, Bilal M, Al-Fuqaha A. Secure and Robust Machine Learning for Healthcare: A Survey. IEEE Reviews in Biomedical Engineering 2021;14:156 View
- Jia H, Aldeen M, Zhao C, Jing S, Chen Z. Flexible privacy‐preserving machine learning: When searchable encryption meets homomorphic encryption. International Journal of Intelligent Systems 2022;37(11):9173 View
- Gao C, Li J, Xia S, Choo K, Lou W, Dong C. MAS-Encryption and its Applications in Privacy-Preserving Classifiers. IEEE Transactions on Knowledge and Data Engineering 2022;34(5):2306 View
- Babenko M, Tchernykh A, Pulido-Gaytan B, Avetisyan A, Nesmachnow S, Wang X, Granelli F. Towards the Sign Function Best Approximation for Secure Outsourced Computations and Control. Mathematics 2022;10(12):2006 View
- Babenko M, Golimblevskaia E, Tchernykh A, Shiriaev E, Ermakova T, Pulido-Gaytan L, Valuev G, Avetisyan A, Gagloeva L. A Comparative Study of Secure Outsourced Matrix Multiplication Based on Homomorphic Encryption. Big Data and Cognitive Computing 2023;7(2):84 View
- Zhang Y, Wu Y, Li T, Zhou H, Chen Y. Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing. Computer Modeling in Engineering & Sciences 2023;137(1):345 View
- Zhou J, Wu N, Wang Y, Gu S, Cao Z, Dong X, Choo K. A Differentially Private Federated Learning Model against Poisoning Attacks in Edge Computing. IEEE Transactions on Dependable and Secure Computing 2022:1 View
- Arazzi M, Nicolazzo S, Nocera A. A Fully Privacy-Preserving Solution for Anomaly Detection in IoT using Federated Learning and Homomorphic Encryption. Information Systems Frontiers 2023 View
- Ge S, Feng D, Song S, Wang J, Huang X. Sparse Logistic Regression-Based One-Bit SAR Imaging. IEEE Transactions on Geoscience and Remote Sensing 2023;61:1 View
- Pulido-Gaytan B, Tchernykh A, Leprévost F, Bouvry P, Goldman A. Toward Understanding Efficient Privacy-Preserving Homomorphic Comparison. IEEE Access 2023;11:102189 View
- Zheng Y, Xu S, Wang S, Gao Y, Hua Z. Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables. IEEE Transactions on Services Computing 2023;16(5):3604 View
- Wang J, Pal A, Yang Q, Kant K, Zhu K, Guo S. Collaborative Machine Learning: Schemes, Robustness, and Privacy. IEEE Transactions on Neural Networks and Learning Systems 2023;34(12):9625 View
- Jiasen L, An W, Guofeng L, Dan Y, Jindan Z. Improved secure PCA and LDA algorithms for intelligent computing in IoT‐to‐cloud setting. Computational Intelligence 2024;40(1) View
- Huang Y, Wang W, Zhao X, Wang Y, Feng X, He H, Yao M. EFMVFL: An Efficient and Flexible Multi-party Vertical Federated Learning without a Third Party. ACM Transactions on Knowledge Discovery from Data 2024;18(3):1 View
- Yang W, Kang P, Wei C. MS-FL: A Federated Learning Framework Based on Multiple Security Strategies. IEEE Access 2024;12:8912 View
- Divakar Allavarpu V, Naresh V, Krishna Mohan A. Privacy‐preserving credit risk analysis based on homomorphic encryption aware logistic regression in the cloud. SECURITY AND PRIVACY 2024;7(3) View
- Wang J, Li J. Blockchain and Access Control Encryption-Empowered IoT Knowledge Sharing for Cloud-Edge Orchestrated Personalized Privacy-Preserving Federated Learning. Applied Sciences 2024;14(5):1743 View
- Sharma A, Marchang N. A review on client-server attacks and defenses in federated learning. Computers & Security 2024;140:103801 View
- Hallaji E, Razavi-Far R, Saif M, Wang B, Yang Q. Decentralized Federated Learning: A Survey on Security and Privacy. IEEE Transactions on Big Data 2024;10(2):194 View
- Bataa M, Song S, Park K, Kim M, Cheon J, Kim S. Finding Highly Similar Regions of Genomic Sequences Through Homomorphic Encryption. Journal of Computational Biology 2024;31(3):197 View
- Liu S, Luo J, Zhang Y, Wang H, Yu Y, Xu Z. Efficient privacy-preserving Gaussian process via secure multi-party computation. Journal of Systems Architecture 2024;151:103134 View
- Wang H, Chen T, Ding Y, Wang Y, Yang C. Privacy-preserving multi-party logistic regression in cloud computing. Computer Standards & Interfaces 2024;90:103857 View
- Jiang H, Shang S, Liu P, Yi T. A fault‐tolerant and scalable boosting method over vertically partitioned data. CAAI Transactions on Intelligence Technology 2024;9(5):1092 View
- Sun P, Cai C, Zhang Y, Yip D, Esmradi A. A confidentiality preserved data sharing framework for decision support in the maritime law enforcement. Marine Policy 2024;167:106244 View
- Yang F, Zhang X, Guo S, Chen D, Gan Y, Xiang T, Liu Y. Robust and privacy-preserving collaborative training: a comprehensive survey. Artificial Intelligence Review 2024;57(7) View
- Suh J, Lee G, Kim J, Shin J, Kim Y, Lee S, Kim S. Privacy-Preserving Prediction of Postoperative Mortality in Multi-Institutional Data: Development and Usability Study. JMIR Medical Informatics 2024;12:e56893 View
- Lyu L, Yu H, Ma X, Chen C, Sun L, Zhao J, Yang Q, Yu P. Privacy and Robustness in Federated Learning: Attacks and Defenses. IEEE Transactions on Neural Networks and Learning Systems 2024;35(7):8726 View
- Shiriaev E, Nazarov A, Kucherov N, Babenko M. Analytical Review of Confidential Artificial Intelligence: Methods and Algorithms for Deployment in Cloud Computing. Programming and Computer Software 2024;50(4):304 View
- Tian M, Liu J, Chen Z, Wang S. Privacy-preserving logistic regression with improved efficiency. Journal of Information Security and Applications 2024;85:103848 View
- Xie Q, Jiang S, Jiang L, Huang Y, Zhao Z, Khan S, Dai W, Liu Z, Wu K. Efficiency Optimization Techniques in Privacy-Preserving Federated Learning With Homomorphic Encryption: A Brief Survey. IEEE Internet of Things Journal 2024;11(14):24569 View
- Li R, Yamana H. Non-interactive Private Multivariate Function Evaluation using Homomorphic Table Lookup. IACR Communications in Cryptology 2024 View
- Marcillo P, Suntaxi G, Hernández-Álvarez M. A Privacy-Preserving Scheme for a Traffic Accident Risk Level Prediction System. Applied Sciences 2024;14(21):9876 View
Books/Policy Documents
- Joye M, Petitcolas F. Data Privacy Management, Cryptocurrencies and Blockchain Technology. View
- Han K, Ki D. Topics in Cryptology – CT-RSA 2020. View
- Cheon J, Han K, Kim A, Kim M, Song Y. Selected Areas in Cryptography – SAC 2018. View
- Cheon J, Han K, Kim A, Kim M, Song Y. Advances in Cryptology – EUROCRYPT 2018. View
- Cheon J, Kim D, Park J. Selected Areas in Cryptography – SAC 2019. View
- Shaik I, Kumar Singh A, Narumanchi H, Emmadi N, Bhattachar R. Cyber Security Cryptography and Machine Learning. View
- Yoo J, Hwang J, Song B, Yoon J. Information Security Practice and Experience. View
- Laine K. Responsible Genomic Data Sharing. View
- Cheon J, Kim D, Kim D, Lee H, Lee K. Advances in Cryptology – ASIACRYPT 2019. View
- Bergamaschi F, Halevi S, Halevi T, Hunt H. Applied Cryptography and Network Security. View
- Kim D, Song Y. Information Security and Cryptology – ICISC 2018. View
- Akavia A, Leibovich M, Resheff Y, Ron R, Shahar M, Vald M. Machine Learning and Knowledge Discovery in Databases. View
- Zuber M, Carpov S, Sirdey R. Information and Communications Security. View
- Jin C, Ragab M, Aung K. Provable and Practical Security. View
- Jutla C, Manohar N. Advances in Cryptology – EUROCRYPT 2022. View
- Hallaji E, Razavi-Far R, Saif M. Federated and Transfer Learning. View
- Shaik I, Emmadi N, Tupsamudre H, Narumanchi H, Bhattachar R. Database and Expert Systems Applications - DEXA 2021 Workshops. View
- Ameur Y, Bouzefrane S, Audigier V. Emerging Trends in Cybersecurity Applications. View
- Trivedi D. Stabilization, Safety, and Security of Distributed Systems. View
- Prantl T, Engel S, Horn L, Kaiser D, Iffländer L, Bauer A, Krupitzer C, Kounev S. Information Security Practice and Experience. View
- Qu H, Xu G. Information and Communications Security. View
- Rodriguez D, Krishnan R. Data and Applications Security and Privacy XXXVII. View
- Rodriguez D, Krishnan R. Information Systems Security. View
- Tao H, Xu C, Zhang P. Tools for Design, Implementation and Verification of Emerging Information Technologies. View
- Ogilvie T. Topics in Cryptology – CT-RSA 2024. View
- Al Badawi A. Support Vector Machines - Algorithms, Optimizations, and Real-World Applications [Working Title]. View
- Wang D, Ma M, Liu L, Du X, Li X, Zhu B. Web Information Systems and Applications. View
- Adir A, Aharoni E, Drucker N, Levy R, Shaul H, Soceanu O. Homomorphic Encryption for Data Science (HE4DS). View