2011
DOI: 10.1109/tifs.2011.2108650
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving ECG Classification With Branching Programs and Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
74
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 160 publications
(76 citation statements)
references
References 45 publications
0
74
0
Order By: Relevance
“…The training algorithm is the same as in the non-privacy-preserving case, thus the resulting models are as vulnerable to inference attacks as any conventionally trained model. This also holds for the models trained by computing on encrypted data [4], [6], [35].…”
Section: Related Workmentioning
confidence: 96%
See 1 more Smart Citation
“…The training algorithm is the same as in the non-privacy-preserving case, thus the resulting models are as vulnerable to inference attacks as any conventionally trained model. This also holds for the models trained by computing on encrypted data [4], [6], [35].…”
Section: Related Workmentioning
confidence: 96%
“…Examples include Google Prediction API, 1 Amazon Machine Learning (Amazon ML), 2 Microsoft Azure Machine Learning (Azure ML), 3 and BigML. 4 These platforms provide simple APIs for uploading the data and for training and querying models, thus making machine learning technologies available to any customer. For example, a developer may create an app that gathers data from users, uploads it into the cloud platform to train a model (or update an existing model with new data), and then uses the model's predictions inside the app to improve its features or better interact with the users.…”
Section: Machine Learning Backgroundmentioning
confidence: 99%
“…Step 2: Divide all the prediction errors into L clusters C k , for 0 ≤ k ≤ L − 1, where k is determined by (5), and each C k is formed by concatenating the mapped prediction errors in a raster-scan order.…”
Section: A Image Encryption Via Prediction Error Clustering and Randmentioning
confidence: 99%
“…. s16, where the numbers within the blocks denote the indexes of the elements of S. Before permutation, the first row becomes (1, 2, 3, 4), the second row becomes (5,6,7,8), etc. The column shifts are specified by a key vector CS = [2 3 0 1], with each column undergoing a downward cyclical shift in accordance with the key value associated with that column.…”
Section: A Image Encryption Via Prediction Error Clustering and Randmentioning
confidence: 99%
“…In [27] the focus is on the analysis of ECG data by a remote server. The security set-up considers a situation in which the server is asked to elaborate a diagnosis by relying on the ECG profile, without learning anything about the profile and even the output of diagnosis.…”
Section: Other Emerging Applicationsmentioning
confidence: 99%