{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T15:54:46Z","timestamp":1756310086199,"version":"3.37.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000080"},{"type":"electronic","value":"9783030000097"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00009-7_45","type":"book-chapter","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T17:20:42Z","timestamp":1537464042000},"page":"496-507","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Privacy-Preserving Classifier in Statistic Pattern Recognition"],"prefix":"10.1007","author":[{"given":"Qi","family":"Wang","sequence":"first","affiliation":[]},{"given":"Dehua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Quanlong","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Yanling","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jimian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,21]]},"reference":[{"issue":"2","key":"45_CR1","first-page":"73","volume":"44","author":"VS Shah","year":"2014","unstructured":"Shah, V.S., Shah, H.R., Samui, P., Ramachandra Murthy, A.: Prediction of fracture parameters of high strength and ultra-high strength concrete beams using minimax probability machine regression and extreme learning machine. Comput. Mater. Continua 44(2), 73\u201384 (2014)","journal-title":"Comput. Mater. Continua"},{"issue":"1","key":"45_CR2","first-page":"83","volume":"54","author":"G Jayaprakash","year":"2015","unstructured":"Jayaprakash, G., Muthuraj, M.P.: Prediction of compressive strength of various SCC mixes using relevance vector machine. Comput. Mater. Continua 54(1), 83\u2013102 (2015)","journal-title":"Comput. Mater. Continua"},{"key":"45_CR3","doi-asserted-by":"crossref","unstructured":"Rahman, F., Addo, I.D., Ahamed, S.I., Yang, J.J., Wang, Q.: Privacy challenges and goals in mHealth systems. In: Advances in Computers (2016)","DOI":"10.1016\/bs.adcom.2016.05.004"},{"key":"45_CR4","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proceedings of the IEEE Symposium on Foundations of Computer Science, pp. 160\u2013164 (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"45_CR5","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Nineteenth ACM Symposium on Theory of Computing, pp. 218\u2013229 (1987)","DOI":"10.1145\/28395.28420"},{"issue":"2","key":"45_CR6","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on Theory and Application of Cryptographic Techniques, pp. 223\u2013238 (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"issue":"3","key":"45_CR8","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/s00145-001-0019-2","volume":"15","author":"Y Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. Adv. Cryptol. 15(3), 177\u2013206 (2000)","journal-title":"Adv. Cryptol."},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Gascn, A., et al.: Privacy-preserving distributed linear regression on high-dimensional data, vol. 2017, no. 4, pp. 345\u2013364 (2017)","DOI":"10.1515\/popets-2017-0053"},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Dan, B., Taft, N.: Privacy-preserving ridge regression on hundreds of millions of records. In: Security and Privacy, pp. 334\u2013348 (2013)","DOI":"10.1109\/SP.2013.30"},{"key":"45_CR11","doi-asserted-by":"crossref","unstructured":"Aono, Y., Hayashi, T., Trieu Phong, L., Wang, L.: Scalable and secure logistic regression via homomorphic encryption, vol. 22, no. 1, pp. 142\u2013144 (2016)","DOI":"10.1145\/2857705.2857731"},{"key":"45_CR12","doi-asserted-by":"crossref","unstructured":"Wu, D.J., Feng, T., Naehrig, M., Lauter, K.: Privately evaluating decision trees and random forests. In: Proceedings on Privacy Enhancing Technologies 2016, no. 4 (2016)","DOI":"10.1515\/popets-2016-0043"},{"key":"45_CR13","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 1310\u20131321 (2015)","DOI":"10.1145\/2810103.2813687"},{"key":"45_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-37682-5_1","volume-title":"Information Security and Cryptology \u2013 ICISC 2012","author":"T Graepel","year":"2013","unstructured":"Graepel, T., Lauter, K., Naehrig, M.: ML confidential: machine learning on encrypted data. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 1\u201321. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37682-5_1"},{"issue":"8","key":"45_CR15","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.jbi.2014.04.003","volume":"50","author":"JW Bos","year":"2014","unstructured":"Bos, J.W., Lauter, K., Naehrig, M.: Private predictive analysis on encrypted medical data. J. Biomed. Inf. 50(8), 234\u2013243 (2014)","journal-title":"J. Biomed. Inf."},{"issue":"1","key":"45_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0169-7439(99)00047-7","volume":"50","author":"R Maesschalck De","year":"2000","unstructured":"De Maesschalck, R., Jouan-Rimbaud, D., Massart, D.L.: The mahalanobis distance. Chemom. Intell. Lab. Syst. 50(1), 1\u201318 (2000)","journal-title":"Chemom. Intell. Lab. Syst."},{"key":"45_CR17","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: ACM Symposium on Theory of Computing. STOC 2009, 31 May\u2013June, Bethesda, MD, USA, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"45_CR18","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Innovations in Theoretical Computer Science Conference, pp. 309\u2013325 (2012)","DOI":"10.1145\/2090236.2090262"},{"key":"45_CR19","doi-asserted-by":"crossref","unstructured":"Catalano, D., Fiore, D.: Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 1518\u20131529 (2015)","DOI":"10.1145\/2810103.2813624"},{"key":"45_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-319-66402-6_10","volume-title":"Computer Security \u2013 ESORICS 2017","author":"M Barbosa","year":"2017","unstructured":"Barbosa, M., Catalano, D., Fiore, D.: Labeled homomorphic encryption. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10492, pp. 146\u2013166. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66402-6_10"},{"key":"45_CR21","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Huang, L., Yang, W., Li, D., Luo, Y., Dong, F.: Three new approaches to privacy-preserving add to multiply protocol and its application. In: Second International Workshop on Knowledge Discovery and Data Mining, pp. 554\u2013558 (2009)","DOI":"10.1109\/WKDD.2009.34"},{"key":"45_CR22","doi-asserted-by":"crossref","unstructured":"Li, Y., Jiang, Z.L., Wang, X., Yiu, S.M.: Privacy-preserving ID3 data mining over encrypted data in outsourced environments with multiple keys. In: IEEE International Conference on Computational Science and Engineering, pp. 548\u2013555 (2017)","DOI":"10.1109\/CSE-EUC.2017.102"},{"key":"45_CR23","doi-asserted-by":"crossref","unstructured":"Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: Security and Privacy, pp. 19\u201338 (2017)","DOI":"10.1109\/SP.2017.12"},{"key":"45_CR24","unstructured":"Stan, O., Zayani, M.-H., Sirdey, R., Hamida, A.B., Leite, A.F., Mziou-Sallami, M.: A new crypto-classifier service for energy efficiency in smart cities. Cryptology ePrint Archive, Report 2017\/1212 (2017). https:\/\/eprint.iacr.org\/2017\/1212"},{"key":"45_CR25","doi-asserted-by":"crossref","unstructured":"Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. In: Network and Distributed System Security Symposium (2015)","DOI":"10.14722\/ndss.2015.23241"},{"key":"45_CR26","unstructured":"Veugen, T.: Comparing encrypted data (2011)"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00009-7_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T09:46:48Z","timestamp":1571910408000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00009-7_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000080","9783030000097"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00009-7_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}