搜索结果: 1-15 共查到“军队指挥学 Classification”相关记录30条 . 查询时间(0.172 秒)
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection
cryptographic protocols SMC
2019/6/26
Classification of personal text messages has many useful applications in surveillance, e-commerce, and mental health care, to name a few. Giving applications access to personal texts can easily lead t...
Computational Limitations in Robust Classification and Win-Win Results
Robust Classification Learning Parity with Noise
2019/2/28
We continue the study of statistical/computational tradeoffs in learning robust classifiers, following the recent work of Bubeck, Lee, Price and Razenshteyn who showed examples of classification tasks...
Achieving Fair Treatment in Algorithmic Classification
fairness classification black-box algorithms
2018/11/8
Fairness in classification has become an increasingly relevant and controversial issue as computers replace humans in many of today’s classification tasks. In particular, a subject of much recent deba...
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification
Attribute-Based Encryption Authorization Classification
2018/11/5
Thanks to the ease of access and low expenses, it is now popular for people to store data in cloud servers. To protect sensitive data from being leaked to the outside, people usually encrypt the data ...
Private Nearest Neighbors Classification in Federated Databases
Multi-Party Computation Text Classification Machine Learning
2018/3/29
Privacy-preserving data analysis in the context of federated databases distributed across multiple parties has the potential to produce richer and more accurate models than what each party can learn w...
S-boxes, typically the only nonlinear part of a block cipher, are the heart of symmetric cryptographic primitives. They significantly impact the cryptographic strength and the implementation character...
PICS: Private Image Classification with SVM
multiparty computation machine learning support vector machines
2017/12/13
The advent of Machine Learning as a Service (MLaaS) makes it possible to outsource a visual object recognition task to an external (e.g. cloud) provider. However, out- sourcing such an image classific...
Image Classification using non-linear Support Vector Machines on Encrypted Data
cryptographic protocols SHE
2017/9/13
In image processing, algorithms for object classification are typically based around machine learning. From the algorithm developer's perspective, these can involve a considerable amount of effort and...
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups
Non-Interactive Assumptions Computational Assumptions Target Assumptions
2017/4/24
Our analysis identifies two families of intractability assumptions, the qq-Generalized Diffie-Hellman Exponent assumptions and the qq-Simple Fractional assumptions that imply all other target assumpti...
Neural Networks (NN) are today increasingly used in Machine Learning where they have become deeper and deeper to accurately model or classify high-level abstractions of data. Their development however...
Machine Learning Classification over Encrypted Data
public-key cryptography implementation applications
2016/1/23
Machine learning classification is used in numerous settings nowadays, such as medical or genomics predictions, spam detection, face recognition, and financial predictions. Due to privacy concerns, i...
On the Classification of Finite Boolean Functions up to Fairness
Complete Fairness Secure Two-Party Computation
2016/1/8
Two parties, P1 and P2, wish to jointly compute some function
f(x, y) where P1 only knows x, whereas P2 only knows y. Furthermore,
and most importantly, the parties wish to reveal only what the
out...
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT
4-bit S-box classification block cipher
2015/12/30
In this paper, we present a new classification of 4-bit optimal S-boxes. All optimal 4-bit Sboxes
can be classified into 183 different categories, among which we specify 3 platinum categories.
Under...
A classification of elliptic curves with respect to the GHS attack in odd characteristic
Elliptic curve cryptosystems Hyperelliptic curve cryptosystems Index calculus
2015/12/24
The GHS attack is known to solve discrete logarithm problems (DLP) in the Jacobian of a curve C_0 defined over the d degree extension field k_d of k:=GF(q) by mapping it to the DLP in the Jacobian of ...
Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack under an Isogeny Condition
Weil descent attack GHS attack
2014/3/11
The GHS attack is known as a method to map the discrete logarithm problem(DLP) in the Jacobian of a curve C_{0} defined over the d degree extension k_{d} of a finite field k to the DLP in the Jacobian...