2013
DOI: 10.1109/mcom.2013.6658656
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative network outage troubleshooting with secure multiparty computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…In other words, the modified DL models should be able to be trained using the encrypted data [90], since applications require the traffic data to be encrypted for privacy preservation. In this strand, the modification of DL models usually needs to consider the methods of traditional privacy preservation technologies such as homomorphic encryption [94], secure multi-party computation [95], and differential privacy [96]. A number of modified DL models have been developed, e.g., E2DM [85] and Gazelle [86] for the cases under homomorphic encryption, DeepSecure [87] and ABY3 [88] for secure multiparty computation, and PATE [89] for differential privacy based scenarios.…”
Section: A Privacy Preservation In Shared Resource Infrastructurementioning
confidence: 99%
“…In other words, the modified DL models should be able to be trained using the encrypted data [90], since applications require the traffic data to be encrypted for privacy preservation. In this strand, the modification of DL models usually needs to consider the methods of traditional privacy preservation technologies such as homomorphic encryption [94], secure multi-party computation [95], and differential privacy [96]. A number of modified DL models have been developed, e.g., E2DM [85] and Gazelle [86] for the cases under homomorphic encryption, DeepSecure [87] and ABY3 [88] for secure multiparty computation, and PATE [89] for differential privacy based scenarios.…”
Section: A Privacy Preservation In Shared Resource Infrastructurementioning
confidence: 99%
“…[11] applied SMC to generate network traffic statistics and anomaly detection. Similarly, [16] reused the same framework to perform collaborative outage detection. Both do not address deployment and data access challenges.…”
Section: Related Workmentioning
confidence: 99%
“…Djatmiko et al [5] reused SEPIA in 2013 to perform collaborative outage detection. They extended an existing approach to work privately with multiple inputs.…”
Section: Related Workmentioning
confidence: 99%