In many practical settings, a user needs to perform computations---for example, using machine learning or cloud/edge computing algorithms---on the data stored in a storage system that consists of one or multiple remote servers. The direct data access may, however, result in exposing the identity of the data items used for the computation process to the server(s), and this can violate the privacy of the user. In recent years, several privacy-preserving schemes with information-theoretic privacy guarantees were proposed for some special cases of the private computation paradigm. Examples of such scenarios are Private Information Retrieval (PIR) and Private Linear Computation (PLC). Inspired by these works, in this thesis we introduce the prob...
This paper presents an approach to privacy-preserving data mining that relies upon a relatively simp...
Computing technologies today have made it much easier to gather personal data, ranging from GPS loca...
Machine learning applications in fields where data is sensitive, such as healthcare and banking, fac...
In many practical settings, a user needs to perform computations---for example, using machine learni...
The rapid development of information and communication technologies has motivated many data-centric ...
The past decade has witnessed the fast growth and tremendous success of machine learning. However, r...
The modern information age is heralded by exciting paradigms that generate a tremendous amount of da...
Private computation is a generalization of private information retrieval, in which a user is able to...
Abstract. Private data is commonly revealed to the party performing the computation on it. This pose...
In today's data-driven world, we are conflicted with two opposing phenomena. On the one hand, collec...
The recent investigation of privacy-preserving data mining has been motivated by the growing concern...
Imagine two companies who each manage part of a delivery network. Suppose these companies are consid...
We consider training machine learning models using data located on multiple private and geographical...
This paper presents an approach to privacy-preserving data mining that relies upon a relatively simp...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
This paper presents an approach to privacy-preserving data mining that relies upon a relatively simp...
Computing technologies today have made it much easier to gather personal data, ranging from GPS loca...
Machine learning applications in fields where data is sensitive, such as healthcare and banking, fac...
In many practical settings, a user needs to perform computations---for example, using machine learni...
The rapid development of information and communication technologies has motivated many data-centric ...
The past decade has witnessed the fast growth and tremendous success of machine learning. However, r...
The modern information age is heralded by exciting paradigms that generate a tremendous amount of da...
Private computation is a generalization of private information retrieval, in which a user is able to...
Abstract. Private data is commonly revealed to the party performing the computation on it. This pose...
In today's data-driven world, we are conflicted with two opposing phenomena. On the one hand, collec...
The recent investigation of privacy-preserving data mining has been motivated by the growing concern...
Imagine two companies who each manage part of a delivery network. Suppose these companies are consid...
We consider training machine learning models using data located on multiple private and geographical...
This paper presents an approach to privacy-preserving data mining that relies upon a relatively simp...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
This paper presents an approach to privacy-preserving data mining that relies upon a relatively simp...
Computing technologies today have made it much easier to gather personal data, ranging from GPS loca...
Machine learning applications in fields where data is sensitive, such as healthcare and banking, fac...