2018
DOI: 10.1016/j.future.2018.04.076
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving machine learning with multiple data providers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 80 publications
(29 citation statements)
references
References 13 publications
0
28
0
1
Order By: Relevance
“…The results of the illustrated method depict a 1% to 2% higher error rate and less accuracy as compared to the non-privacy preserving deep learning computational model. There are also some other related works that addressed the privacy protection issue in classification [84][85][86][87]. Because of the inefficiency problem with cryptographic solutions, there are also several related works presenting more efficient techniques including differential privacy [88][89][90].…”
Section: Privacy Preservationmentioning
confidence: 99%
“…The results of the illustrated method depict a 1% to 2% higher error rate and less accuracy as compared to the non-privacy preserving deep learning computational model. There are also some other related works that addressed the privacy protection issue in classification [84][85][86][87]. Because of the inefficiency problem with cryptographic solutions, there are also several related works presenting more efficient techniques including differential privacy [88][89][90].…”
Section: Privacy Preservationmentioning
confidence: 99%
“…A la falta de formación y entrenamiento en análisis de datos (en técnicas para descripción, diagnóstico, predicción y prescripción) se suman los aspectos de seguridad de la información y protección de datos, de manera que la calidad de los datos internos y externos y su uso sean garantizados tanto para las empresas como para los potenciales clientes, como lo propone, ( Li, Li, Ye, Li, Chen & Xiang, 2018). La evolución de la computación cognitiva está permitiendo y permitirá cada vez con mayor incidencia una mejor toma de decisiones, gracias a los avances de las ciencias de los datos y su aplicación a la comercialización y el marketing.…”
Section: Conclusionesunclassified
“…For example, the monitoring device should verify that the data actually came from the sensor at the specified location rather than being tampered with an attacker [28]. The traditional security and privacy policies based on asymmetric encryption are difficult to implement in an IoT environment, mainly due to the follow reasons:…”
Section: Problem Statementmentioning
confidence: 99%