![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Privacy-Preserving and Outsourced Density Peaks Clustering Algorithm
With the powerful platform of cloud, it is attractive for an organization with massive data to outsource to a cloud provider. However, the data owner may have concerns about the privacy of its data. In this pa...
-
Chapter and Conference Paper
Improving Communication Efficiency for Encrypted Distributed Training
Secure Multi-Party Computation (SMPC) is usually treated as a special encryption way. Unlike most encryption methods using a private or public key to encrypt data, it splits a value into different shares, and ...
-
Chapter and Conference Paper
Efficient and Secure Outsourced Linear Regression
The linear regression, as a classical machine learning algorithm, is often used to be a predictor. In the era of big data, the data owner can outsource their linear regression task and data to the cloud server...