{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:44:14Z","timestamp":1729615454422,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/iscbi.2017.8053548","type":"proceedings-article","created":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T20:24:13Z","timestamp":1506975853000},"page":"75-80","source":"Crossref","is-referenced-by-count":1,"title":["A multi-key compressed sensing and machine learning privacy preserving computing scheme"],"prefix":"10.1109","author":[{"given":"Mohamed Waleed","family":"Fakhr","sequence":"first","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TSMCB.2009.2038493"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.compbiolchem.2016.09.010"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICITST.2016.7856681"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ACCESS.2016.2569421"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/MILCOM.2008.4753187"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIFS.2015.2493982"},{"year":"2017","journal-title":"Matlab Toolbox for robust Least Squares SVM Regression","key":"ref16"},{"year":"0","key":"ref17"},{"key":"ref18","first-page":"395","article-title":"A Neural Network Approach for Binary Hashing in Image Retrieval","author":"emara","year":"2016","journal-title":"Intl Conf on Advanced Intelligent Systems and Informatics AISI-2016"},{"year":"0","key":"ref19"},{"key":"ref4","article-title":"CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy","volume":"48","author":"gilad-bachrach","year":"2016","journal-title":"Proc 33rd Int Conf Mach Learn"},{"key":"ref3","article-title":"Machine Learning Classification over Encrypted Data","author":"bost","year":"2014","journal-title":"IACR Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/JBHI.2015.2407157"},{"key":"ref5","first-page":"1","article-title":"ML Confidential: Machine Learning on Encrypted Data","author":"graepel","year":"2012","journal-title":"Intl Conf on Information Security and Cryptology"},{"key":"ref8","article-title":"A review of Homomorphic Encryption and Software Tools for Encrypted Statistical Machine Learning","author":"aslett","year":"2015","journal-title":"Technical Report"},{"key":"ref7","article-title":"Guide to Fully Homomorphic Encryption","author":"armknecht","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/ACCESS.2014.2307057","article-title":"Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization","volume":"2","author":"lu","year":"2014","journal-title":"IEEE Access"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MSP.2012.2219653","article-title":"Encrypted Signal Processing for Privacy Protection","volume":"30","author":"inald","year":"2013","journal-title":"IEEE Signal Processing Magazine"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/JSTSP.2009.2039178"}],"event":{"name":"2017 5th International Symposium on Computational and Business Intelligence (ISCBI)","start":{"date-parts":[[2017,8,11]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2017,8,14]]}},"container-title":["2017 5th International Symposium on Computational and Business Intelligence (ISCBI)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/8046246\/8053526\/08053548.pdf?arnumber=8053548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T05:14:27Z","timestamp":1570166067000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/8053548\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":19,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/iscbi.2017.8053548","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}