NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

rodbar dam slope stability analysis using neural networks

در این تحقیق شبکه عصبی مصنوعی برای پیش بینی مقادیر ضریب اطمینان و فاکتور ایمنی بحرانی سدهای خاکی ناهمگن ضمن در نظر گرفتن تاثیر نیروی اینرسی زلزله ارائه شده است. ورودی های مدل شامل ارتفاع سد و زاویه شیب بالا دست، ضریب زلزله، ارتفاع آب، پارامترهای مقاومتی هسته و پوسته و خروجی های آن شامل ضریب اطمینان می شود. مهمترین پارامتر مورد نظر در تحلیل پایداری شیب، بدست آوردن فاکتور ایمنی است. در این تحقیق ...

Implementing Neural Networks Efficiently

Neural networks and machine learning algorithms in general require a flexible environment where new algorithm prototypes and experiments can be set up as quickly as possible with best possible computational performance. To that end, we provide a new framework called Torch7, that is especially suited to achieve both of these competing goals. Torch7 is a versatile numeric computing framework and ...

متن کامل

Multi-Objective Training of Neural Networks

Traditionally, the application of a neural network (Haykin, 1999) to solve a problem has required to follow some steps before to obtain the desired network. Some of these steps are the data preprocessing, model selection, topology optimization and then the training. It is usual to spend a large amount of computational time and human interaction to perform each task of before and, particularly, ...

متن کامل

Secure Encrypted Relational Data with using K-Nn Classification

With the recent quality of cloud computing, users currently have the chance to source their information, in encrypted kind, still because the data processing tasks to the cloud. Since the info on the cloud is in encrypted kind, existing privacy-preserving classification techniques aren't applicable. During this paper, we tend to target resolution the classification drawback over encrypted infor...

متن کامل

Decryption of Chaotically Encrypted Signals Using Neural Networks

ABSTRACT A possible data encryption scheme is to add a small amplitude message to a larger amplitude chaotic carrier signal. The primary objective of this research was to see if a neural network could approximately recover the hidden message if was given the intercepted signal. It was found that even with a reasonably complex carrier signal, the message was, to an extent, recoverable. The remai...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2021

ISSN: 1545-5971,1941-0018,2160-9209

DOI: 10.1109/tdsc.2021.3074439