Many data-driven personalized services require that private data of users is scored against a trained machine learning model. In this paper we propose a novel protocol for privacy-preserving classification of decision trees, a popular machine learning model in these scenarios. Our solutions is composed out of building blocks, namely a secure comparison protocol, a protocol for obliviously selecting inputs, and a protocol for multiplication. By combining some of the building blocks for our decision tree classification protocol, we also improve previously proposed solutions for classification of support vector machines and logistic regression models. Our protocols are information theoretically secure and, unlike previously proposed solutions,...
This paper studies how to build a decision tree clas-sifier under the following scenario: a database...
Abstract—In this paper, we study the problem of constructing private classifiers using decision tree...
We apply multiparty computation (MPC) techniques to show, given a database that is secret-shared amo...
Many data-driven personalized services require that private data of users is scored against a traine...
Privacy preservation is a key issue in outsourcing of data mining. When we seek approaches to protec...
Most existing Secure Multi-Party Computation (MPC) protocols for privacy-preserving training of deci...
Privacy attacks targeting machine learning models are evolving. One of the primary goals of such att...
Decision trees are popular machine-learning classification models due to their simplicity and effect...
Decision trees and random forests are common classifiers with widespread use. In this paper, we deve...
Machine learning classification is used in numerous settings nowadays, such as medical or genomics p...
Decision trees are a popular method for a variety of machine learning tasks. A typical application s...
Privacy-preserving machine learning enables the training of models on decentralized datasets without...
In this paper we develop a range of practical cryptographic protocols for secure decision tree learn...
Machine Learning (ML) techniques now impact a wide variety of domains. Highly regulated industries s...
BACKGROUND: Logistic regression is a popular technique used in machine learning to construct classif...
This paper studies how to build a decision tree clas-sifier under the following scenario: a database...
Abstract—In this paper, we study the problem of constructing private classifiers using decision tree...
We apply multiparty computation (MPC) techniques to show, given a database that is secret-shared amo...
Many data-driven personalized services require that private data of users is scored against a traine...
Privacy preservation is a key issue in outsourcing of data mining. When we seek approaches to protec...
Most existing Secure Multi-Party Computation (MPC) protocols for privacy-preserving training of deci...
Privacy attacks targeting machine learning models are evolving. One of the primary goals of such att...
Decision trees are popular machine-learning classification models due to their simplicity and effect...
Decision trees and random forests are common classifiers with widespread use. In this paper, we deve...
Machine learning classification is used in numerous settings nowadays, such as medical or genomics p...
Decision trees are a popular method for a variety of machine learning tasks. A typical application s...
Privacy-preserving machine learning enables the training of models on decentralized datasets without...
In this paper we develop a range of practical cryptographic protocols for secure decision tree learn...
Machine Learning (ML) techniques now impact a wide variety of domains. Highly regulated industries s...
BACKGROUND: Logistic regression is a popular technique used in machine learning to construct classif...
This paper studies how to build a decision tree clas-sifier under the following scenario: a database...
Abstract—In this paper, we study the problem of constructing private classifiers using decision tree...
We apply multiparty computation (MPC) techniques to show, given a database that is secret-shared amo...