2013 IEEE 16th International Conference on Computational Science and Engineering 2013
DOI: 10.1109/cse.2013.200
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Support Vector Machine Using Non-linear Kernels on Hadoop Mahout

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…More recently, Vaidya et al [51] showed how to train a SVM classifier, in a privacy-preserving manner, based on vertically, horizontally, and arbitrarily partitioned training data. In follow-up work, Teo et al [48] improved upon the efficiency of the solution of Vaidya et al [51], and showed that their approach scales well to address the challenges of data mining on big data. Chase et al [9] combine MPC techniques with differential privacy techniques to achieve private neural network learning.…”
Section: Related Workmentioning
confidence: 99%
“…More recently, Vaidya et al [51] showed how to train a SVM classifier, in a privacy-preserving manner, based on vertically, horizontally, and arbitrarily partitioned training data. In follow-up work, Teo et al [48] improved upon the efficiency of the solution of Vaidya et al [51], and showed that their approach scales well to address the challenges of data mining on big data. Chase et al [9] combine MPC techniques with differential privacy techniques to achieve private neural network learning.…”
Section: Related Workmentioning
confidence: 99%
“…It is assumed that these parties are not willing to share their data directly, but would like to work together to learn the output of any agreed mining task. Various SMC techniques have been proposed to serve different mining tasks, such as decision tree [5], Naïve Bayes [27], Support Vector Machine [6], and Singular Value Decomposition [28], However, most of these techniques [29], [1] only consider secure addition and secure multiplication operations; they cannot be applied to the cases that include more complicated operations such as secure division. In addition, these techniques are ad-hoc, and thus difficult to be directly applied to mining tasks other than those they target.…”
Section: B Related Workmentioning
confidence: 99%
“…Such a property is very effective in protecting personal privacy. Thus, SMC has been extensively applied in privacy-preserving computation, such as decision tree [5] and Support Vector Machine [6] of the PPDM, and privacy preserving approaches on the cloud [7], [8]. However, most proposed techniques are ad-hoc and specific to tasks.…”
Section: Introductionmentioning
confidence: 99%
“…As a machine learning algorithm with high computational efficiency and nice predictive accuracy, the support vector machine (SVM) has achieved high classification accuracy and efficiency in the medical field [6,7]. However, the existing privacy preserving SVM schemes mainly implement secure prediction [8][9][10][11], and there are few privacy preserving SVM schemes for secure training. Most of the existing privacy preserving SVM schemes are designed for binary classification, which can only determine whether the patient has the disease [12], but cannot deal with the multiclass of the disease.…”
Section: Introductionmentioning
confidence: 99%