2022
DOI: 10.1007/s00354-022-00185-z
|View full text |Cite
|
Sign up to set email alerts
|

A Differential Approach for Data and Classification Service-Based Privacy-Preserving Machine Learning Model in Cloud Environment

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(2 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…Their effectiveness as well as accuracy were then calculated and compared to other systems. Method that makes DL better with fewer resources and in less time was proposed by author [9]. They came up with the model "SP-PCA-SVM," which uses the Apache Spark tool to combine Support Vector Machine (SVM) and Parallel Principal Component Analysis (PCA) to speed up learning.…”
Section: Soft Computing Computer Network Existing Techniques;mentioning
confidence: 99%
“…Their effectiveness as well as accuracy were then calculated and compared to other systems. Method that makes DL better with fewer resources and in less time was proposed by author [9]. They came up with the model "SP-PCA-SVM," which uses the Apache Spark tool to combine Support Vector Machine (SVM) and Parallel Principal Component Analysis (PCA) to speed up learning.…”
Section: Soft Computing Computer Network Existing Techniques;mentioning
confidence: 99%
“…Moreover, the co-residency of virtual machines of multiple users on a common physical server often leads to malicious activities like, data hampering and leakage of cloud user's confidential data [10,[92][93][94][95][96][97][98][99][100][101][102]. The malicious user or hacker launches one or multiple of virtual machines and exploits multiple network routes by achieving co-residency with the target virtual machine [29,[103][104][105][106][107][108][109][110][111][112]. The vulnerabilities and susceptibilities of virtual machines management layer and hypervisor facilitates malicious user to get access to target physical machine and compromise all the virtual machines hosted on it.…”
Section: Introductionmentioning
confidence: 99%