Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200115-9.doi: 10.11896/jsjkx.241200115
• Information Security • Previous Articles Next Articles
LI Jincheng, LI Yingna, FU Guoqing
CLC Number:
| [1]OLINDER N,FEDYAKIN K,KORNEEVA E.Personal dataprotection in the internet of things [C]//Proceedings of the 1st International Scientific Conference Legal Regulation of the Digital Economy and Digital Relations:Problems and Prospects of Development.New York,USA:Atlantis Press,2021:227-232. [2]ZHANG J,CHEN B,ZHAO Y,et al.Data security and privacy-preserving in edge computing paradigm:Survey and open issues [J].IEEE Access,2018,6:18209-18237. [3]SACHDEV A,BHANSALI M.Enhancing cloud computing security using AES algorithm [J].International Journal of Computer Applications,2013,67(9):19-23. [4]BRAKERSKI Z.Fully homomorphic encryption without modulus switching from classical GapSVP [C]//Annual Cryptology Conference.Heidelberg,Germany:Springer,2012:868-886. [5]CHEON J H,KIM A,KIM M,et al.Homomorphic encryption for arithmetic of approximate numbers [C]//Advances in Cryptology-ASIACRYPT 2017.Heidelberg,Germany:Springer International Publishing,2017:409-437. [6]MASAHIRO Y.Fully Homomorphic encryption without bootstrapping [M].Saarbrücken,Germany:LAP LAMBERT Academic Publishing,2015. [7]FAN J,VERCAUTEREN F.Somewhat practical fully homo-morphic encryption [EB/OL].[2012-03-22].https://ia.cr/2012/144. [8]ALLOGHANI M,ALANI M M,AL-JUMEILY D,et al.A systematic review on the status and progress of homomorphic encryption technologies [J].Journal of Information Security and Applications,2019,48:102362. [9]CHEN H,GILAD-BACHRACH R,HAN K,et al.Logistic regression over encrypted data from fully homomorphic encryption [J].BMC Medical Genomics,2018,11(4):3-12. [10]CROCKETT E.A low-depth homomorphic circuit for logisticregression model training [EB/OL].[2024-05-01].https://ia.cr/2020/1483. [11]GILAD-BACHRACH R,DOWLIN N,LAINE K,et al.Cryp-tonets:Applying neural networks to encrypted data with high throughput and accuracy [C]//International Conference on Machine Learning.New York,USA:PMLR,2016:201-210. [12]BOST R,POPA R A,TU S,et al.Machine learning classification over encrypted data [EB/OL].[2015-01-12].https://ia.cr/2014/331. [13]COCK M D,DOWSLEY R,HORST C,et al.Efficient and pri-vate scoring of decision trees,support vector machines and logistic regression models based on pre-computation[J].IEEE Transactions on Dependable and Secure Computing,2019,16(2):217-230. [14]ZHAO J,ZHU H,WANG F,et al.Efficient and privacy-preserving tree-based inference via additive homomorphic encryption [J].Information Sciences,2023,650:119480. [15]TUENO A,BOEV Y,KERSCHBAUM F.Non-interactive private decision tree evaluation [C]//34th Annual IFIP WG 11.3 Conference.Berlin,Germany:Springer International Publishing,2020:174-194. [16]XU K,TAN B H M,WANG L P,et al.Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption [J].Journal of Information Security and Applications,2023,77:103582. [17]TUENO A,KERSCHBAUM F,KATZENBEISSER S.Private evaluation of decision trees using sublinear cost [J].Proceedings on Privacy Enhancing Technologies,2019(1):266-286. [18]LU W J,ZHOU J J,SAKUMA J.Non-interactive and Output Expressive Private Comparison from Homomorphic Encryption [C]//Proceedings of the 2018 on Asia Conference on Computer and Communications Security.New York,USA:ACM,2018:67-74. [19]HAN Z,GE C,WU B,et al.Privet:A privacy-preserving federated incremental decision trees [J].IEEE Transactions on Ser-vices Computing,2023,16(3):1964-1975. [20]ZHENG Y,XU S,WANG S,et al.Privet:A privacy-preserving vertical federated learning service for gradient boosted decision tables [J].IEEE Transactions on Services Computing,2023,16(5):3604-3620. [21]YAMAMOT F,OZAWA S,WANG L.eFL-Boost:Efficientfederated learning for gradient boosting decision trees [J].IEEE Access,2022,10:43954-43963. [22]ZHAO J,ZHU H,XU W,et al.SGBoost:An efficient and priva-cy-preserving vertical federated tree boosting framework [J].IEEE Transactions on Information Forensics and Security,2023,18:1022-1036. [23]BLATT M,GUSEV A,POLYAKOV Y,et al.Optimized homomorphic encryption solution for secure genome-wide association studies [J].BMC Medical Genomics,2020,13(7):83. [24]BOURA C,GAMA N,GEORGIEVA M,et al.Chimera:Combining ring-lwe-based fully homomorphic encryption schemes [J].Journal of Mathematical Cryptology,2020,14(1):316-338. [25]EL ZEIN Y,LEMAY M,HUGUENIN K.PrivaTree:Collabora-tive privacy-preserving training of decision trees on biomedical data [J].IEEE/ACM Transactions on Computational Biology and Bioinformatics,2023,21(1):1-13. [26]CHEN Y C,CHANG C C,HUNG C C,et al.SecDT:privacy-preserving outsourced decision tree classification without polynomial forms in edge-cloud computing [J].IEEE Transactions on Signal and Information Processing over Networks,2022,8:1037-1048. |
| [1] | HAN Yingmei, LI Bin, LI Kun, ZHOU Qinglei, YU Shiliang. Efficient Hardware Implementation of Pipelined NTT for Dynamic Rotation Factor Generation [J]. Computer Science, 2025, 52(9): 160-169. |
| [2] | JIANG Wenhui, YE Jianhong, GAO Lingting, HUANG Yifan. Fairness-enhancing Decision Tree Algorithm [J]. Computer Science, 2025, 52(11A): 241200119-9. |
| [3] | HE Yuyu, ZHOU Feng, TIAN Youliang, XIONG Wei, WANG Shuai. Lightweight Privacy-preserving Mobile Sensing Classification Framework Based on AddictiveSecret Sharing [J]. Computer Science, 2025, 52(11): 415-424. |
| [4] | LIU Dongqi, ZHANG Qiong, LIANG Haolan, ZHANG Zidong, ZENG Xiangjun. Study on Smart Grid AMI Intrusion Detection Method Based on Federated Learning [J]. Computer Science, 2024, 51(6A): 230700077-8. |
| [5] | WANG Chengzhang, BAI Xiaoming, TANG Wenying, CHEN Shuhan. Evolutionary CatBoost Based Housing Price Prediction Model [J]. Computer Science, 2024, 51(11A): 240300180-5. |
| [6] | ZENG Congai, LIU Yali, CHEN Shuyi, ZHU Xiuping, NING Jianting. Multi-type K-nearest Neighbor Query Scheme with Mutual Privacy-preserving in Road Networks [J]. Computer Science, 2024, 51(11): 400-417. |
| [7] | KE Haiping, MAO Yijun, GU Wanrong. Recommendation Model Based on Decision Tree and Improved Deep & Cross Network [J]. Computer Science, 2023, 50(6A): 220300084-7. |
| [8] | SHI Liang, WEN Liangming, LEI Sheng, LI Jianhui. Virtual Machine Consolidation Algorithm Based on Decision Tree and Improved Q-learning by Uniform Distribution [J]. Computer Science, 2023, 50(6): 36-44. |
| [9] | ZHANG Zelun, YANG Zhibin, LI Xiaojie, ZHOU Yong, LI Wei. Machine Learning Based Environment Assumption Automatic Generation for Compositional Verification of SCADE Models [J]. Computer Science, 2023, 50(6): 297-306. |
| [10] | ZHAO Min, TIAN Youliang, XIONG Jinbo, BI Renwan, XIE Hongtao. Neural Network Model Training Method Based on Homomorphic Encryption [J]. Computer Science, 2023, 50(5): 372-381. |
| [11] | ZHANG Lianfu, TAN Zuowen. Federated Learning Privacy-preserving Approach for Multimodal Medical Data [J]. Computer Science, 2023, 50(11A): 230800021-8. |
| [12] | CHEN Depeng, LIU Xiao, CUI Jie, HE Daojing. Survey of Membership Inference Attacks for Machine Learning [J]. Computer Science, 2023, 50(1): 302-317. |
| [13] | LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325. |
| [14] | LI Li, HE Xin, HAN Zhi-jie. Review of Privacy-preserving Mechanisms in Crowdsensing [J]. Computer Science, 2022, 49(5): 303-310. |
| [15] | QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346. |
|
||