{"id":"https://openalex.org/W4403434613","doi":"https://doi.org/10.1186/s13677-024-00711-y","title":"PPDNN-CRP: privacy-preserving deep neural network processing for credit risk prediction in cloud: a homomorphic encryption-based approach","display_name":"PPDNN-CRP: privacy-preserving deep neural network processing for credit risk prediction in cloud: a homomorphic encryption-based approach","publication_year":2024,"publication_date":"2024-10-15","ids":{"openalex":"https://openalex.org/W4403434613","doi":"https://doi.org/10.1186/s13677-024-00711-y"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-024-00711-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-024-00711-y","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00711-y","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00711-y","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058248739","display_name":"Vankamamidi S. Naresh","orcid":"https://orcid.org/0000-0002-6273-9041"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Vankamamidi S. Naresh","raw_affiliation_strings":["Department of CSE, Sri Vasavi Engineering College, Tadepalligudem, Andhra Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Sri Vasavi Engineering College, Tadepalligudem, Andhra Pradesh, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114280695","display_name":"D Ayyappa","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ayyappa D","raw_affiliation_strings":["Department of CSE, Sri Vasavi Engineering College, Tadepalligudem, Andhra Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Sri Vasavi Engineering College, Tadepalligudem, Andhra Pradesh, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058248739"],"corresponding_institution_ids":[],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":2.8574,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.92005758,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"13","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9382506012916565},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6708744764328003},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6682921648025513},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5539982914924622},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4868723452091217},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.43419864773750305},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4051643908023834},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3409290611743927},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3332173228263855},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3322374224662781},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.17017725110054016},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.12505215406417847},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09137442708015442}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9382506012916565},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6708744764328003},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6682921648025513},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5539982914924622},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4868723452091217},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.43419864773750305},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4051643908023834},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3409290611743927},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3332173228263855},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3322374224662781},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.17017725110054016},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.12505215406417847},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09137442708015442}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-024-00711-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-024-00711-y","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00711-y","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:757faa090808416b9ce1a862477ca0ff","is_oa":true,"landing_page_url":"https://doaj.org/article/757faa090808416b9ce1a862477ca0ff","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-21 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-024-00711-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-024-00711-y","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00711-y","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.5400000214576721,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4403434613.pdf"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W43196267","https://openalex.org/W1981276685","https://openalex.org/W2481704219","https://openalex.org/W2534885692","https://openalex.org/W2913377715","https://openalex.org/W2913868799","https://openalex.org/W2966080601","https://openalex.org/W3027577364","https://openalex.org/W3044683821","https://openalex.org/W3092054893","https://openalex.org/W3108342020","https://openalex.org/W3112787034","https://openalex.org/W3123763288","https://openalex.org/W3127901052","https://openalex.org/W3134210339","https://openalex.org/W3146497429","https://openalex.org/W3156424100","https://openalex.org/W3212912762","https://openalex.org/W4206821392","https://openalex.org/W4213336077","https://openalex.org/W4223622367","https://openalex.org/W4225466681","https://openalex.org/W4226149995","https://openalex.org/W4247763204","https://openalex.org/W4283745144","https://openalex.org/W4285194983","https://openalex.org/W4285245206","https://openalex.org/W4285284940","https://openalex.org/W4321321579","https://openalex.org/W4323317915","https://openalex.org/W4380997695","https://openalex.org/W4386701626","https://openalex.org/W4391321273"],"related_works":["https://openalex.org/W4316659877","https://openalex.org/W3035389378","https://openalex.org/W2607647996","https://openalex.org/W3183645941","https://openalex.org/W2911298733","https://openalex.org/W3111147403","https://openalex.org/W3100960533","https://openalex.org/W2949835517","https://openalex.org/W1540514112","https://openalex.org/W4400079231"],"abstract_inverted_index":{"This":[0,155],"study":[1],"proposes":[2],"a":[3,96,112,158],"Privacy-Preserving":[4,89],"Deep":[5],"Neural":[6],"Network":[7],"for":[8,54,61,161],"Credit":[9],"Risk":[10],"Prediction":[11],"(PPDNN-CRP)":[12],"framework":[13,31,64,156],"that":[14,77,130],"leverages":[15],"homomorphic":[16,35],"encryption":[17,36,150],"(HE)":[18],"to":[19,38,70,88],"ensure":[20],"data":[21,43,169],"privacy":[22,136,153,170],"throughout":[23],"the":[24,33,46,63,66,100],"credit":[25,164],"risk":[26,165],"prediction":[27,166],"process.":[28],"The":[29,74,106],"PPDNN-CRP":[30,78,131],"employs":[32],"Paillier":[34],"scheme":[37],"secure":[39],"sensitive":[40],"loan":[41,68],"application":[42],"during":[44],"both":[45],"training":[47],"and":[48,59,95,122,145,152,171,175],"inference":[49],"phases.":[50],"Implemented":[51],"using":[52],"TensorFlow":[53],"deep":[55],"neural":[56],"network":[57],"operations":[58],"TenSEAL":[60],"HE,":[62],"uses":[65],"Kaggle":[67],"dataset":[69],"evaluate":[71],"its":[72],"performance.":[73],"results":[75],"show":[76],"achieved":[79],"an":[80,123],"accuracy":[81],"of":[82,114,117,120,125],"80.48%,":[83],"demonstrating":[84],"competitive":[85],"performance":[86],"compared":[87],"Logistic":[90],"Regression":[91],"(PPLR)":[92],"at":[93,104],"77.23%":[94],"slight":[97],"decrease":[98],"from":[99],"non-private":[101],"DNN-CRP":[102],"model":[103,107,143,146],"86.18%.":[105],"exhibited":[108],"strong":[109],"metrics":[110],"with":[111,173],"precision":[113],"0.84,":[115],"recall":[116],"0.91,":[118],"F1-score":[119],"0.87,":[121],"AUC":[124],"0.74.":[126],"Security":[127],"analysis":[128],"confirms":[129],"effectively":[132],"defends":[133],"against":[134],"various":[135],"attacks,":[137],"including":[138],"poisoning,":[139],"evasion,":[140],"membership":[141],"inference,":[142],"inversion,":[144],"extraction,":[147],"through":[148],"robust":[149],"techniques":[151],"measures.":[154],"offers":[157],"promising":[159],"approach":[160],"achieving":[162],"high-quality":[163],"while":[167],"maintaining":[168],"complying":[172],"legal":[174],"ethical":[176],"standards.":[177]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
