Cost-adaptive Neural Networks for Peak Volume Prediction with EMM Filtering
2019 IEEE International Conference on Big Data, Los Angeles, CA, USA, December 9-12, 2019 (2019)
As the emergence of the Internet of Things (IoT) and the growing number of IoT devices, a stable connection service ...
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation
Advances in Neural Information Processing Systems 32 (2019)
Classification of personal text messages has many useful applications in surveillance, e-commerce, and mental health care, to name a few. ...
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra
IEEE Transactions on Information Forensics and Security (2016)
Linear algebra operations on private distributed data are frequently required in several practical scenarios (e.g., statistical analysis and privacy preserving ...
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model
International Journal of Information Security (2014)
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polynomial p(x)p(x)p(x) and a receiver inputs ...
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the ...
IEEE Transactions on Information Theory (2011)
Information-theoretically secure string oblivious transfer (OT) can be constructed based on discrete memoryless channel (DMC). The oblivious transfer capacity of ...
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based ...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (2011)
This paper presents a non-interactive veriable secret shar- ing scheme (VSS) tolerating a dishonest majority based on data pre- distributed ...