{"id":"https://openalex.org/W2957686556","doi":"https://doi.org/10.1109/icc.2019.8761610","title":"Efficient and Privacy-Preserving Outsourced SVM Classification in Public Cloud","display_name":"Efficient and Privacy-Preserving Outsourced SVM Classification in Public Cloud","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2957686556","doi":"https://doi.org/10.1109/icc.2019.8761610","mag":"2957686556"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2019.8761610","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761610","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051918696","display_name":"Jinwen Liang","orcid":"https://orcid.org/0000-0003-1306-3185"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinwen Liang","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035491991","display_name":"Zheng Qin","orcid":"https://orcid.org/0000-0003-0877-3887"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Qin","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033931001","display_name":"Jianbing Ni","orcid":"https://orcid.org/0000-0002-5639-0883"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jianbing Ni","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083787204","display_name":"Xiaodong Lin","orcid":"https://orcid.org/0000-0001-8916-6645"},"institutions":[{"id":"https://openalex.org/I79817857","display_name":"University of Guelph","ror":"https://ror.org/01r7awg59","country_code":"CA","type":"education","lineage":["https://openalex.org/I79817857"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xiaodong Lin","raw_affiliation_strings":["School of Computer Science, University of Guelph, Guelph, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Guelph, Guelph, Canada","institution_ids":["https://openalex.org/I79817857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100773343","display_name":"Xuemin Shen","orcid":"https://orcid.org/0000-0002-4140-287X"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xuemin Shen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5051918696"],"corresponding_institution_ids":["https://openalex.org/I16609230"],"apc_list":null,"apc_paid":null,"fwci":1.2601,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.85059265,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"1","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7863404750823975},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7841532826423645},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7559655904769897},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6931719779968262},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6691680550575256},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6351735591888428},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5336068272590637},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.5184252262115479},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.5112781524658203},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47514772415161133},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.40004533529281616},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3792960047721863},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32037097215652466},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.14510980248451233}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7863404750823975},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7841532826423645},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7559655904769897},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6931719779968262},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6691680550575256},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6351735591888428},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5336068272590637},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.5184252262115479},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.5112781524658203},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47514772415161133},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40004533529281616},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3792960047721863},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32037097215652466},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.14510980248451233},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2019.8761610","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761610","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4399999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1964366273","https://openalex.org/W1984680759","https://openalex.org/W2031533839","https://openalex.org/W2031738616","https://openalex.org/W2077198179","https://openalex.org/W2092071682","https://openalex.org/W2111620756","https://openalex.org/W2119874464","https://openalex.org/W2147667726","https://openalex.org/W2149298154","https://openalex.org/W2160791236","https://openalex.org/W2332738317","https://openalex.org/W2408514126","https://openalex.org/W2460441129","https://openalex.org/W2747433492","https://openalex.org/W2794159901","https://openalex.org/W2800439477","https://openalex.org/W2803039886","https://openalex.org/W2859081967","https://openalex.org/W2892100170","https://openalex.org/W2950943617","https://openalex.org/W2963103668","https://openalex.org/W6676949966","https://openalex.org/W6677855611","https://openalex.org/W6718865826","https://openalex.org/W6751891662"],"related_works":["https://openalex.org/W2358200898","https://openalex.org/W4231184955","https://openalex.org/W2325765407","https://openalex.org/W2788012436","https://openalex.org/W618293728","https://openalex.org/W2291845669","https://openalex.org/W200604156","https://openalex.org/W2374784346","https://openalex.org/W2382515644","https://openalex.org/W1930396972"],"abstract_inverted_index":{"Data":[0],"classification":[1,39,96,154,180],"has":[2],"become":[3],"an":[4,88,144],"important":[5],"and":[6,19,34,37,56,86,90,115,139,151,159,173,176],"prevailing":[7],"technique":[8],"for":[9,94],"big":[10],"data":[11,15,60,175],"analytics.":[12],"Typically,":[13],"a":[14,22,140],"classifier":[16,55,111,132,172],"is":[17,104,119,133],"designed":[18],"outsourced":[20,134],"to":[21,65,106,112,121,135,148],"public":[23,67,98,137],"cloud.":[24,68],"A":[25],"service":[26,102],"provider":[27,103],"then":[28],"can":[29,142,167],"easily":[30],"provide":[31],"various":[32],"services":[33],"handle":[35],"frequent":[36],"massive":[38],"requests":[40],"from":[41],"users.":[42],"With":[43],"privacy":[44],"concerns":[45],"as":[46,48,125],"well":[47],"Intellectual":[49],"Property(IP)":[50],"protection":[51],"issues,":[52],"the":[53,57,66,75,82,101,108,116,126,130,136,149,153,169],"valuable":[54],"sensitive":[58],"user":[59,141],"cannot":[61],"be":[62],"directly":[63],"exposed":[64],"In":[69],"this":[70],"paper,":[71],"we":[72],"focus":[73],"on":[74],"Support":[76],"Vector":[77],"Machine":[78],"(SVM),":[79],"one":[80],"of":[81,171,183],"most":[83],"popular":[84],"classifiers,":[85],"propose":[87],"efficient":[89,178],"privacy-preserving":[91],"outsourcing":[92],"scheme":[93,166],"SVM":[95,110,179],"in":[97,181],"clouds.":[99],"Specifically,":[100],"allowed":[105],"transform":[107],"traditional":[109],"fixed":[113],"hyper-rectangles":[114,124],"order-preserving":[117],"encryption":[118],"utilized":[120],"encrypt":[122],"these":[123],"encrypted":[127,131,145],"classifier.":[128],"Afterwards,":[129],"cloud,":[138],"submit":[143],"range":[146],"query":[147],"cloud":[150],"obtain":[152],"results":[155],"back.":[156],"Security":[157],"analysis":[158],"extensive":[160],"experimental":[161],"evaluation":[162],"demonstrate":[163],"that":[164],"our":[165],"protect":[168],"confidentiality":[170],"users'":[174],"achieves":[177],"terms":[182],"computational":[184],"cost.":[185]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
