UM  > 科技學院  > 電腦及資訊科學系
Secure and verifiable outsourcing of nonnegative matrix factorization (NMF)
Duan, Jia; Zhou, Jiantao; Li, Yuanman
2016
Conference Name4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2016
Source PublicationIH and MMSec 2016 - Proceedings of the 2016 ACM Information Hiding and Multimedia Security Workshop
Pages63-68
Conference Date6 20, 2016 - 6 22, 2016
Conference PlaceVigo, Galicia, Spain
Author of SourceAssociation for Computing Machinery, Inc
AbstractCloud computing platforms are becoming increasingly prevalent and readily available nowadays, providing us alternative and economic services for resource-constrained clients to perform large-scale computation. In this work, we ad- dress the problem of secure outsourcing of large-scale non- negative matrix factorization (NMF) to a cloud in a way that the client can verify the correctness of results with small overhead. The input matrix protection is achieved by a lightweight, permutation-based encryption mechanism. By exploiting the iterative nature of NMF computation, we propose a single-round verification strategy, which can be proved to be effective. Both theoretical and experimental results are given to demonstrate the superior performance of our scheme. © 2016 ACM.
DOI10.1145/2909827.2930794
Language英语
全文获取链接
引用统计
Document TypeConference paper
专题DEPARTMENT OF COMPUTER AND INFORMATION SCIENCE
AffiliationUniversity of Macau, China
First Author AffilicationUniversity of Macau
推荐引用方式
GB/T 7714
Duan, Jia,Zhou, Jiantao,Li, Yuanman. Secure and verifiable outsourcing of nonnegative matrix factorization (NMF)[C]//Association for Computing Machinery, Inc,2016:63-68.
个性服务
推荐该条目
保存到收藏夹
查看访问统计
导出为Endnote文件
Google Scholar
中相似的文章 Google Scholar
[Duan, Jia]的文章
[Zhou, Jiantao]的文章
[Li, Yuanman]的文章
Baidu academic
中相似的文章 Baidu academic
[Duan, Jia]的文章
[Zhou, Jiantao]的文章
[Li, Yuanman]的文章
Bing Scholar
中相似的文章 Bing Scholar
[Duan, Jia]的文章
[Zhou, Jiantao]的文章
[Li, Yuanman]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。