UM

Browse/Search Results:  1-6 of 6 Help

Selected(0)Clear Items/Page:    Sort:
Homo-ELM: fully homomorphic extreme learning machine Journal article
International Journal of Machine Learning and Cybernetics, 2020,Volume: 11,Issue: 7,Page: 1531-1540
Authors:  Wang,Weiru;  Gan,Yanfen;  Vong,Chi Man;  Chen,Chuangquan
Favorite |  | TC[WOS]:2 TC[Scopus]:2 | Submit date:2021/03/11
Encrypted image classification  Encrypted machine learning  Extreme learning machine  Fully homomorphic encryption  Privacy preservation  
Encrypted image classification based on multilayer extreme learning machine Journal article
MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2017,Volume: 28,Issue: 3,Page: 851-865
Authors:  Wang, Weiru;  Vong, Chi-Man;  Yang, Yilong;  Wong, Pak-Kin
Favorite |  | TC[WOS]:8 TC[Scopus]:8 | Submit date:2018/10/30
Encrypted Image Classification  Privacy Preservation  Multi Layer Extreme Learning Machine  Elm Auto Encoder  
A Strategy-proof Privacy-preserving Double Auction Mechanism for Electrical Vehicles Demand Response in Microgrids Conference paper
Authors:  Li, Donghe;  Yang, Qingyu;  Yu, Wei;  An, Dou;  Yang, Xinyu;  Zhao, Wei;  IEEE
Favorite |  | TC[WOS]:1 TC[Scopus]:0 | Submit date:2018/10/30
Smart grids/cyber-physical systems  strategy-proofness  privacy preservation  
An image classification method that considers privacy-preservation Journal article
Neurocomputing, 2016,Volume: 208,Page: 80-98
Authors:  Chongwen Liu;  Zhaowei Shang;  Yuan Yan Tang
Favorite |  | TC[WOS]:5 TC[Scopus]:6 | Submit date:2019/02/11
Ensemble System  Image Classification  Privacy-preservation  
Good governance and confidentiality: a matter of the preservation of the public sphere Journal article
Corporate Governance, 2014,Volume: 14,Issue: 4,Page: 543-554
Authors:  Miguel Goede;  Rostam J. Neuwirth
Favorite |  | TC[WOS]:0 TC[Scopus]:3 | Submit date:2020/12/04
Confidentiality  Good Governance  Populism  Privacy  Public Sphere  Social Media  Transparency  
Hiding sensitive association rules using central tendency Conference paper
Proc. - 6th Intl. Conference on Advanced Information Management and Service, IMS2010, with ICMIA2010 - 2nd International Conference on Data Mining and Intelligent Information Technology Applications, Seoul, South Korea, 30 Nov.-2 Dec. 2010
Authors:  Muhammad Naeem;  Sohail Asghar;  Simon Fong
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Central Tendency  Data Mining  Privacy Preservation  Sensitive Association Rules