{"id":"https://openalex.org/W4388856774","doi":"https://doi.org/10.1145/3576915.3624406","title":"Poster:\u00a0Computing the Persistent Homology of Encrypted Data","display_name":"Poster:\u00a0Computing the Persistent Homology of Encrypted Data","publication_year":2023,"publication_date":"2023-11-15","ids":{"openalex":"https://openalex.org/W4388856774","doi":"https://doi.org/10.1145/3576915.3624406"},"language":"en","primary_location":{"id":"doi:10.1145/3576915.3624406","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3576915.3624406","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008585025","display_name":"Dominic Gold","orcid":"https://orcid.org/0009-0005-5783-1766"},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dominic Gold","raw_affiliation_strings":["Florida Atlantic University, Boca Raton, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida Atlantic University, Boca Raton, FL, USA","institution_ids":["https://openalex.org/I63772739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087800081","display_name":"Koray Karabina","orcid":"https://orcid.org/0000-0001-9538-8877"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]},{"id":"https://openalex.org/I4210159778","display_name":"National Research Council Canada","ror":"https://ror.org/04mte1k06","country_code":"CA","type":"government","lineage":["https://openalex.org/I4210159778"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Koray Karabina","raw_affiliation_strings":["National Research Council Canada &amp; University of Waterloo, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"National Research Council Canada &amp; University of Waterloo, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I4210159778","https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014650825","display_name":"Francis C. Motta","orcid":"https://orcid.org/0000-0002-0364-5440"},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Francis Motta","raw_affiliation_strings":["Florida Atlantic University, Boca Raton, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida Atlantic University, Boca Raton, FL, USA","institution_ids":["https://openalex.org/I63772739"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008585025"],"corresponding_institution_ids":["https://openalex.org/I63772739"],"apc_list":null,"apc_paid":null,"fwci":0.2009,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57622923,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"3546","last_page":"3548"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12536","display_name":"Topological and Geometric Data Analysis","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12536","display_name":"Topological and Geometric Data Analysis","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12923","display_name":"Digital Image Processing Techniques","score":0.9440000057220459,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9327999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/persistent-homology","display_name":"Persistent homology","score":0.9408421516418457},{"id":"https://openalex.org/keywords/topological-data-analysis","display_name":"Topological data analysis","score":0.8198913335800171},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7262294292449951},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7037218809127808},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5531198978424072},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.51983243227005},{"id":"https://openalex.org/keywords/expansive","display_name":"Expansive","score":0.5102024078369141},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.48064959049224854},{"id":"https://openalex.org/keywords/point-cloud","display_name":"Point cloud","score":0.47786635160446167},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4725871980190277},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45775991678237915},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.38176414370536804},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28505778312683105}],"concepts":[{"id":"https://openalex.org/C2874115","wikidata":"https://www.wikidata.org/wiki/Q17099562","display_name":"Persistent homology","level":2,"score":0.9408421516418457},{"id":"https://openalex.org/C2776477805","wikidata":"https://www.wikidata.org/wiki/Q4460773","display_name":"Topological data analysis","level":2,"score":0.8198913335800171},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7262294292449951},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7037218809127808},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5531198978424072},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.51983243227005},{"id":"https://openalex.org/C2780502288","wikidata":"https://www.wikidata.org/wiki/Q28838156","display_name":"Expansive","level":3,"score":0.5102024078369141},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.48064959049224854},{"id":"https://openalex.org/C131979681","wikidata":"https://www.wikidata.org/wiki/Q1899648","display_name":"Point cloud","level":2,"score":0.47786635160446167},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4725871980190277},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45775991678237915},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38176414370536804},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28505778312683105},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C30407753","wikidata":"https://www.wikidata.org/wiki/Q186191","display_name":"Compressive strength","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3576915.3624406","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3576915.3624406","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:cisti-icist.nrc-cnrc.ca:cistinparc:64dba46d-321f-45f7-a2ae-4e320f7ba014","is_oa":false,"landing_page_url":"https://nrc-publications.canada.ca/eng/view/object/?id=64dba46d-321f-45f7-a2ae-4e320f7ba014","pdf_url":null,"source":{"id":"https://openalex.org/S7407055245","display_name":"NPARC","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"poster"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2088492763","https://openalex.org/W2272065411","https://openalex.org/W2964237352","https://openalex.org/W2989605743","https://openalex.org/W3033511014","https://openalex.org/W3129083929","https://openalex.org/W3202868818"],"related_works":["https://openalex.org/W2886923060","https://openalex.org/W2887690685","https://openalex.org/W2129730857","https://openalex.org/W4287394697","https://openalex.org/W3119689987","https://openalex.org/W3120766012","https://openalex.org/W4287826795","https://openalex.org/W3128725485","https://openalex.org/W3210518039","https://openalex.org/W2567662842"],"abstract_inverted_index":{"Topological":[0],"Data":[1],"Analysis":[2],"(TDA)":[3],"offers":[4],"a":[5,62,108],"suite":[6],"of":[7,15,48,77,110],"computational":[8],"tools":[9],"that":[10,19],"provide":[11,61],"quantified":[12],"shape":[13],"features":[14],"high":[16],"dimensional":[17],"data":[18,36,66,102,119],"can":[20,69],"be":[21,70,97],"used":[22],"by":[23],"modern":[24],"statistical":[25],"and":[26,68],"predictive":[27],"machine":[28],"learning":[29],"(ML)":[30],"models.":[31],"Persistent":[32],"homology":[33],"(PH)":[34],"transforms":[35],"(e.g.,":[37],"point":[38],"clouds,":[39],"images,":[40],"time":[41],"series)":[42],"into":[43,99],"persistence":[44],"diagrams":[45],"(PDs)--compact":[46],"representations":[47],"its":[49],"latent":[50],"topological":[51],"structures.":[52],"Because":[53],"PDs":[54],"enjoy":[55],"inherent":[56],"noise":[57],"tolerance,":[58],"are":[59],"interpretable,":[60],"solid":[63],"basis":[64],"for":[65,87],"analysis,":[67],"made":[71],"compatible":[72],"with":[73],"the":[74,111],"expansive":[75],"set":[76],"well-established":[78],"ML":[79],"model":[80,88],"architectures,":[81],"PH":[82,116],"has":[83],"been":[84],"widely":[85],"adopted":[86],"development":[89],"including":[90],"on":[91,117],"sensitive":[92],"data.":[93],"Thus,":[94],"TDA":[95],"should":[96],"incorporated":[98],"secure":[100],"end-to-end":[101],"analysis":[103],"pipelines.":[104],"This":[105],"paper":[106],"introduces":[107],"version":[109],"fundamental":[112],"algorithm":[113],"to":[114],"compute":[115],"encrypted":[118],"using":[120],"homomorphic":[121],"encryption":[122],"(HE).":[123]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-02T08:37:19.008085","created_date":"2025-10-10T00:00:00"}
