{"id":"https://openalex.org/W4205496611","doi":"https://doi.org/10.23919/eusipco54536.2021.9615991","title":"Secure Computation of Gaussian Process Regression for Data Analysis","display_name":"Secure Computation of Gaussian Process Regression for Data Analysis","publication_year":2021,"publication_date":"2021-08-23","ids":{"openalex":"https://openalex.org/W4205496611","doi":"https://doi.org/10.23919/eusipco54536.2021.9615991"},"language":"en","primary_location":{"id":"doi:10.23919/eusipco54536.2021.9615991","is_oa":false,"landing_page_url":"https://doi.org/10.23919/eusipco54536.2021.9615991","pdf_url":null,"source":{"id":"https://openalex.org/S4363607854","display_name":"2021 29th European Signal Processing Conference (EUSIPCO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 29th European Signal Processing Conference (EUSIPCO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075048116","display_name":"Takayuki Nakachi","orcid":"https://orcid.org/0000-0002-7970-454X"},"institutions":[{"id":"https://openalex.org/I4210155580","display_name":"University of the Ryukyus University Hospital","ror":"https://ror.org/05rzmnp25","country_code":"JP","type":"healthcare","lineage":["https://openalex.org/I4210155580"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Takayuki Nakachi","raw_affiliation_strings":["Information Technology Center, University of the Ryukyus, Japan"],"affiliations":[{"raw_affiliation_string":"Information Technology Center, University of the Ryukyus, Japan","institution_ids":["https://openalex.org/I4210155580"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011262125","display_name":"Yitu Wang","orcid":"https://orcid.org/0000-0003-4453-5966"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yitu Wang","raw_affiliation_strings":["NTT Network Innovation Laboratories, Nippon Telegraph and Telephone Corporation, Yokosuka-city Kanagawa, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Network Innovation Laboratories, Nippon Telegraph and Telephone Corporation, Yokosuka-city Kanagawa, Japan","institution_ids":["https://openalex.org/I2251713219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075048116"],"corresponding_institution_ids":["https://openalex.org/I4210155580"],"apc_list":null,"apc_paid":null,"fwci":0.6283,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.71359133,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1441","last_page":"1445"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12814","display_name":"Gaussian Processes and Bayesian Inference","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ground-penetrating-radar","display_name":"Ground-penetrating radar","score":0.7616835832595825},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7521034479141235},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7443103790283203},{"id":"https://openalex.org/keywords/kriging","display_name":"Kriging","score":0.7176935076713562},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7143754959106445},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.623852550983429},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5082735419273376},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4896681606769562},{"id":"https://openalex.org/keywords/gaussian-process","display_name":"Gaussian process","score":0.4768334925174713},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.46997326612472534},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4657346308231354},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.46161115169525146},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.45790764689445496},{"id":"https://openalex.org/keywords/unitary-transformation","display_name":"Unitary transformation","score":0.42357420921325684},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3256242275238037},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.29896366596221924},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2894664406776428},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26060235500335693},{"id":"https://openalex.org/keywords/radar","display_name":"Radar","score":0.12686187028884888},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1184205412864685}],"concepts":[{"id":"https://openalex.org/C71813955","wikidata":"https://www.wikidata.org/wiki/Q503560","display_name":"Ground-penetrating radar","level":3,"score":0.7616835832595825},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7521034479141235},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7443103790283203},{"id":"https://openalex.org/C81692654","wikidata":"https://www.wikidata.org/wiki/Q225926","display_name":"Kriging","level":2,"score":0.7176935076713562},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7143754959106445},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.623852550983429},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5082735419273376},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4896681606769562},{"id":"https://openalex.org/C61326573","wikidata":"https://www.wikidata.org/wiki/Q1496376","display_name":"Gaussian process","level":3,"score":0.4768334925174713},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.46997326612472534},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4657346308231354},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.46161115169525146},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.45790764689445496},{"id":"https://openalex.org/C179371143","wikidata":"https://www.wikidata.org/wiki/Q2495534","display_name":"Unitary transformation","level":3,"score":0.42357420921325684},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3256242275238037},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29896366596221924},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2894664406776428},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26060235500335693},{"id":"https://openalex.org/C554190296","wikidata":"https://www.wikidata.org/wiki/Q47528","display_name":"Radar","level":2,"score":0.12686187028884888},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1184205412864685},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/eusipco54536.2021.9615991","is_oa":false,"landing_page_url":"https://doi.org/10.23919/eusipco54536.2021.9615991","pdf_url":null,"source":{"id":"https://openalex.org/S4363607854","display_name":"2021 29th European Signal Processing Conference (EUSIPCO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 29th European Signal Processing Conference (EUSIPCO)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1490122681","https://openalex.org/W1567512734","https://openalex.org/W2050770647","https://openalex.org/W2063978378","https://openalex.org/W2085762799","https://openalex.org/W2110401929","https://openalex.org/W2237358707","https://openalex.org/W2620783544","https://openalex.org/W2766678531","https://openalex.org/W2998555882","https://openalex.org/W3000508506","https://openalex.org/W3044222737","https://openalex.org/W3082336254","https://openalex.org/W3106853766","https://openalex.org/W4211049957"],"related_works":["https://openalex.org/W4315471419","https://openalex.org/W566010457","https://openalex.org/W2600092203","https://openalex.org/W4293503520","https://openalex.org/W4300066510","https://openalex.org/W2056958800","https://openalex.org/W2803685231","https://openalex.org/W3134152097","https://openalex.org/W4311388919","https://openalex.org/W2966696655"],"abstract_inverted_index":{"We":[0,57],"propose":[1],"Gaussian":[2],"process":[3],"regression":[4],"(GPR)":[5],"for":[6,62,70],"encrypted":[7,63],"data":[8,25,39,64,85],"generated":[9],"based":[10],"on":[11],"random":[12],"unitary":[13],"transformation.":[14],"Edge":[15],"cloud":[16],"computing":[17],"is":[18],"spreading":[19],"into":[20],"many":[21],"application":[22],"fields,":[23],"including":[24],"analysis":[26,89],"services.":[27],"However,":[28],"new":[29],"privacy":[30,55],"concerns":[31],"are":[32],"being":[33],"raised":[34],"regarding":[35],"things":[36],"such":[37],"as":[38,68],"leakage":[40],"from":[41,86],"unreliable":[42],"providers":[43],"and":[44,91],"accidents.":[45],"Therefore,":[46],"we":[47,74],"examine":[48],"a":[49],"secure":[50],"GPR":[51,61,69],"method":[52,80],"that":[53,59],"incorporates":[54],"protection.":[56],"prove":[58],"our":[60,79],"performs":[65],"the":[66,76,87],"same":[67],"non-encrypted":[71],"data.":[72,93],"Finally,":[73],"determine":[75],"effectiveness":[77],"of":[78],"by":[81],"experimenting":[82],"with":[83],"diabetes":[84],"medical":[88],"field":[90],"synthetic":[92]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
