{"id":"https://openalex.org/W2767201895","doi":"https://doi.org/10.1145/3140649.3140655","title":"Privacy-preserving Machine Learning in Cloud","display_name":"Privacy-preserving Machine Learning in Cloud","publication_year":2017,"publication_date":"2017-10-31","ids":{"openalex":"https://openalex.org/W2767201895","doi":"https://doi.org/10.1145/3140649.3140655","mag":"2767201895"},"language":"en","primary_location":{"id":"doi:10.1145/3140649.3140655","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3140649.3140655","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 on Cloud Computing Security Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028351338","display_name":"Ehsan Hesamifard","orcid":null},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ehsan Hesamifard","raw_affiliation_strings":["University of North Texas, Denton, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of North Texas, Denton, TX, USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080052284","display_name":"Hassan Takabi","orcid":null},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hassan Takabi","raw_affiliation_strings":["University of North Texas, Denton, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of North Texas, Denton, TX, USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032291617","display_name":"Mehdi Ghasemi","orcid":"https://orcid.org/0000-0002-9551-1780"},"institutions":[{"id":"https://openalex.org/I32625721","display_name":"University of Saskatchewan","ror":"https://ror.org/010x8gc63","country_code":"CA","type":"education","lineage":["https://openalex.org/I32625721"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mehdi Ghasemi","raw_affiliation_strings":["University of Saskatchewan, Saskatchewan, Canada"],"affiliations":[{"raw_affiliation_string":"University of Saskatchewan, Saskatchewan, Canada","institution_ids":["https://openalex.org/I32625721"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035098827","display_name":"Catherine Jones","orcid":"https://orcid.org/0000-0003-4049-1003"},"institutions":[{"id":"https://openalex.org/I20486536","display_name":"Meredith College","ror":"https://ror.org/02g0yj703","country_code":"US","type":"education","lineage":["https://openalex.org/I20486536"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Catherine Jones","raw_affiliation_strings":["Meredith College, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"Meredith College, Raleigh, NC, USA","institution_ids":["https://openalex.org/I20486536"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5028351338"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":2.5353,"has_fulltext":false,"cited_by_count":65,"citation_normalized_percentile":{"value":0.91995562,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"39","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8526831865310669},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8374345302581787},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7503571510314941},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7296990752220154},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6909418106079102},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6221134662628174},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5672255158424377},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5243138074874878},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.45628058910369873},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3295453190803528},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3148854672908783}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8526831865310669},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8374345302581787},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7503571510314941},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7296990752220154},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6909418106079102},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6221134662628174},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5672255158424377},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5243138074874878},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.45628058910369873},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3295453190803528},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3148854672908783},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3140649.3140655","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3140649.3140655","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 on Cloud Computing Security Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W236632755","https://openalex.org/W1826232489","https://openalex.org/W1913201021","https://openalex.org/W1934785035","https://openalex.org/W2014765124","https://openalex.org/W2031738616","https://openalex.org/W2053637704","https://openalex.org/W2130010995","https://openalex.org/W2435473771","https://openalex.org/W2460519802","https://openalex.org/W2479638076","https://openalex.org/W2521090836","https://openalex.org/W2701059868","https://openalex.org/W2768347741","https://openalex.org/W3120740533"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W3150465815","https://openalex.org/W1997222214","https://openalex.org/W2802581102","https://openalex.org/W4385544042"],"abstract_inverted_index":{"Machine":[0,32],"learning":[1,45,55],"algorithms":[2,56,91],"based":[3],"on":[4,49],"deep":[5,88],"neural":[6,89,109],"networks":[7,110],"(NN)":[8],"have":[9],"achieved":[10],"remarkable":[11],"results":[12,141],"and":[13,42,67,72,105,114,119,135,149],"are":[14,38,47],"being":[15],"extensively":[16],"used":[17],"in":[18,124],"different":[19],"domains.":[20],"On":[21],"the":[22,93,122,132],"other":[23],"hand,":[24],"with":[25],"increasing":[26],"growth":[27],"of":[28,131],"cloud":[29,50],"services,":[30],"several":[31],"Learning":[33],"as":[34],"a":[35],"Service":[36],"(MLaaS)":[37],"offered":[39],"where":[40],"training":[41,148],"deploying":[43],"machine":[44,54],"models":[46],"performed":[48],"providers'":[51],"infrastructure.":[52],"However,":[53],"require":[57],"access":[58],"to":[59,83,92,107,115],"raw":[60],"data":[61,113],"which":[62],"is":[63,103],"often":[64],"privacy":[65,73],"sensitive":[66],"can":[68],"create":[69],"potential":[70],"security":[71],"risks.":[74],"To":[75],"address":[76],"this":[77,97],"issue,":[78],"we":[79,99],"develop":[80],"new":[81],"techniques":[82,134],"provide":[84],"solutions":[85],"for":[86],"applying":[87],"network":[90],"encrypted":[94,112,117,126],"data.":[95],"In":[96],"paper,":[98],"show":[100,142],"that":[101,143],"it":[102,144],"feasible":[104],"practical":[106],"train":[108],"using":[111],"make":[116],"predictions,":[118],"also":[120],"return":[121],"predictions":[123],"an":[125],"form.":[127],"We":[128],"demonstrate":[129],"applicability":[130],"proposed":[133],"evaluate":[136],"its":[137],"performance.":[138],"The":[139],"empirical":[140],"provides":[145],"accurate":[146],"privacy-preserving":[147],"classification.":[150]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
