<p>Each institution (possessing private data) locally computes summary statistics from its own data, and submits encrypted aggregates following a strong cryptographic scheme [<a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0156479#pone.0156479.ref030" target="_blank">30</a>]. The Computation Centers securely aggregate the encryptions and conduct model estimation, from which the model adjustment feedback will be sent back as necessary. This iterative process continues until model convergence.</p
Data island effectively blocks the practical application of machine learning. To meet this challenge...
Abstract. Regression is arguably the most applied data analysis method. Today there are many scenari...
Abstract Background One of the tasks in the 2017 iDASH secure genome analysis competition was to ena...
Abstract. Preserving the privacy of individual databases when carrying out sta-tistical calculations...
Background: Learning a model without accessing raw data has been an intriguing idea to security and ...
BACKGROUND: Logistic regression is a popular technique used in machine learning to construct classif...
Scientific collaborations benefit from sharing information and data from distributed sources, but pr...
Much data and information have been collected about us from all aspects of our life. Sometimes, we n...
Abstract. The machine learning community has focused on confiden-tiality problems associated with st...
We present several methods for performing linear regression on the union of distributed databases th...
Background Security concerns have been raised since big data became a prominent too...
Machine learning applications are intensively utilized in various science fields, and increasingly t...
Machine learning on (homomorphic) encrypted data is a cryptographic method for analyzing private and...
Privacy-preserving data mining (PPDM) techniques aim to construct efficient data mining algorithms w...
Security concerns have been raised since big data became a prominent tool in data analysis. For inst...
Data island effectively blocks the practical application of machine learning. To meet this challenge...
Abstract. Regression is arguably the most applied data analysis method. Today there are many scenari...
Abstract Background One of the tasks in the 2017 iDASH secure genome analysis competition was to ena...
Abstract. Preserving the privacy of individual databases when carrying out sta-tistical calculations...
Background: Learning a model without accessing raw data has been an intriguing idea to security and ...
BACKGROUND: Logistic regression is a popular technique used in machine learning to construct classif...
Scientific collaborations benefit from sharing information and data from distributed sources, but pr...
Much data and information have been collected about us from all aspects of our life. Sometimes, we n...
Abstract. The machine learning community has focused on confiden-tiality problems associated with st...
We present several methods for performing linear regression on the union of distributed databases th...
Background Security concerns have been raised since big data became a prominent too...
Machine learning applications are intensively utilized in various science fields, and increasingly t...
Machine learning on (homomorphic) encrypted data is a cryptographic method for analyzing private and...
Privacy-preserving data mining (PPDM) techniques aim to construct efficient data mining algorithms w...
Security concerns have been raised since big data became a prominent tool in data analysis. For inst...
Data island effectively blocks the practical application of machine learning. To meet this challenge...
Abstract. Regression is arguably the most applied data analysis method. Today there are many scenari...
Abstract Background One of the tasks in the 2017 iDASH secure genome analysis competition was to ena...