{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:58:17Z","timestamp":1730296697306,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/smartcomp.2017.7947011","type":"proceedings-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:36:09Z","timestamp":1497551769000},"page":"1-4","source":"Crossref","is-referenced-by-count":10,"title":["Fully Homomorphic Encryption for Classification in Machine Learning"],"prefix":"10.1109","author":[{"given":"Seiko","family":"Arita","sequence":"first","affiliation":[]},{"given":"Shota","family":"Nakasato","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"ref12","article-title":"Faster privacy-preserving search for genome sequences using fully homomorphic encryption","author":"ishimaki","year":"2016","journal-title":"SCIS'16"},{"key":"ref13","article-title":"Cryptographically-secure Outsourcing of statistical Data Analysis I: Descriptive Statistics","author":"lu","year":"2015","journal-title":"CSS'15"},{"key":"ref14","first-page":"3","article-title":"Private Computation on Encrypted Genomic Data","author":"lauter","year":"2014","journal-title":"LATINCRYPT"},{"key":"ref15","first-page":"70","author":"liu","year":"2015","journal-title":"Fung Secure Outsourced Frequent Pattern Mining by Fully Homomorphic Encryption"},{"key":"ref16","first-page":"774","article-title":"Pattern recognition using generalized portrait method","volume":"24","author":"vapnik","year":"1963","journal-title":"Automation and Remote Control"},{"key":"ref4","first-page":"315","article-title":"Batch fully homomorphic encryption over the integers","author":"hee cheon","year":"2013","journal-title":"Thomas Johansson and Phong Q Nguyen"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref6","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","author":"fan","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_15"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref1","first-page":"331","article-title":"Machine learning classification over encrypted data","author":"bost","year":"2014","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11889663_5"}],"event":{"name":"2017 IEEE International Conference on Smart Computing (SMARTCOMP)","start":{"date-parts":[[2017,5,29]]},"location":"Hong Kong, China","end":{"date-parts":[[2017,5,31]]}},"container-title":["2017 IEEE International Conference on Smart Computing (SMARTCOMP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7943263\/7946954\/07947011.pdf?arnumber=7947011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T00:04:29Z","timestamp":1506989069000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7947011\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/smartcomp.2017.7947011","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}