2018
DOI: 10.1016/j.ins.2018.02.058
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
83
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 172 publications
(84 citation statements)
references
References 22 publications
0
83
0
1
Order By: Relevance
“…However, it may leak privacy information through statistical inference, even though the perturbed data is hard to be reconstructed [8,[16][17][18][19][20][21][22][23]. However, many limitations exist for perturbation.…”
Section: Related Workmentioning
confidence: 99%
“…However, it may leak privacy information through statistical inference, even though the perturbed data is hard to be reconstructed [8,[16][17][18][19][20][21][22][23]. However, many limitations exist for perturbation.…”
Section: Related Workmentioning
confidence: 99%
“…Apart from that, applying machine learning techniques in medical applications could raise security and privacy issues, Weizhi discussed the CPS (Cyber‐physical System) attacks in the medical domains and proposed intrusion detection approach based on the behavioral profiling which shows a high performance. Machine learning has also been highly practically integrated in medical applications; a framework to avoid patients' private information leakage has been proposed based on the double‐blinding technique . For meeting the various of the medical data application, a new Naive Bayes classifier is set by Li et al, which could meet the requirements of the diverse private data.…”
Section: Related Workmentioning
confidence: 99%
“…Using information gained from the IoT could make the environment around us be better cognized [4]. On the other hand, the IoT consists of devices that generate, process, and exchange vast amounts of critical security and safety data as well as privacy-sensitive information and hence are appealing targets for cyberattacks [5][6][7][8]. The task of affordably supporting security and privacy is quite challenging because many new networkable devices, which constitute the IoT, require less energy, are lightweight and have less memory [9].…”
Section: Introductionmentioning
confidence: 99%