Privacy-preserving machine learning enables the training of models on decentralized datasets without the need to reveal the information, both on horizontally and vertically partitioned data. However, it requires specialized techniques and algorithms to perform the necessary computations. The privacy preserving scalar product protocol, which enables the dot product of vectors without revealing them, is one popular example for its versatility. For example it can be used to perform analyses that require counting the number of samples which fulfill certain criteria defined across various sites, such as calculating the information gain at a node in a decision tree. Unfortunately, the solutions currently proposed in the literature focus on two-pa...
Abstract. The secure scalar product (or dot product) is one of the most used sub-protocols in privac...
Cross-organizational collaborative decision-making involves a great deal of private information whic...
Machine learning has assumed an increasingly important role in Artificial Intelligence in recent yea...
Privacy-preserving machine learning enables the training of models on decentralized datasets without...
Privacy-preserving machine learning enables the training of models on decentralized datasets without...
Abstract. In mining and integrating data from multiple sources, there are many privacy and security ...
The recent investigation of privacy-preserving data mining has been motivated by the growing concern...
The past decade has witnessed the fast growth and tremendous success of machine learning. However, r...
We propose a novel two-party privacy-preserving classification solution called Collaborative Classif...
Data mining is a process to extract useful knowledge from large amounts of data. To conduct data min...
We propose privacy-preserving protocols for computing linear regression models, in the setting where...
In this paper, we address the problem of privacy-preserving distributed learning and the evaluation ...
We consider training machine learning models using data located on multiple private and geographical...
We show how multiple data-owning parties can collaboratively train several machine learning algorith...
Many data-driven personalized services require that private data of users is scored against a traine...
Abstract. The secure scalar product (or dot product) is one of the most used sub-protocols in privac...
Cross-organizational collaborative decision-making involves a great deal of private information whic...
Machine learning has assumed an increasingly important role in Artificial Intelligence in recent yea...
Privacy-preserving machine learning enables the training of models on decentralized datasets without...
Privacy-preserving machine learning enables the training of models on decentralized datasets without...
Abstract. In mining and integrating data from multiple sources, there are many privacy and security ...
The recent investigation of privacy-preserving data mining has been motivated by the growing concern...
The past decade has witnessed the fast growth and tremendous success of machine learning. However, r...
We propose a novel two-party privacy-preserving classification solution called Collaborative Classif...
Data mining is a process to extract useful knowledge from large amounts of data. To conduct data min...
We propose privacy-preserving protocols for computing linear regression models, in the setting where...
In this paper, we address the problem of privacy-preserving distributed learning and the evaluation ...
We consider training machine learning models using data located on multiple private and geographical...
We show how multiple data-owning parties can collaboratively train several machine learning algorith...
Many data-driven personalized services require that private data of users is scored against a traine...
Abstract. The secure scalar product (or dot product) is one of the most used sub-protocols in privac...
Cross-organizational collaborative decision-making involves a great deal of private information whic...
Machine learning has assumed an increasingly important role in Artificial Intelligence in recent yea...