A Secure and Practical Mechanism for Outsourcing ELMs in Cloud Computing

被引:0
|
作者
Lin, Jiarun [1 ]
Yin, Jianping [1 ]
Cai, Zhiping [1 ]
Liu, Qiang [1 ]
Li, Kuan [1 ]
Leung, Victor C. M. [2 ]
机构
[1] Natl Univ Def Technol, Changsha, Hunan, Peoples R China
[2] Univ British Columbia, Vancouver, BC V5Z 1M9, Canada
关键词
EXTREME LEARNING-MACHINE; REGRESSION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
引用
收藏
页码:35 / 38
页数:4
相关论文
共 50 条
  • [31] An Enhance Mechanism for Secure Data Sharing with Identity Management in Cloud Computing
    Modi, Hardika
    Patel, Shital
    Suthar, Krunal
    ADVANCES IN COMPUTING AND INTELLIGENT SYSTEMS, ICACM 2019, 2020, : 575 - 582
  • [32] Secure Desktop Computing in the Cloud
    Krisler, Brian
    Pal, Partha
    Bertilson, Zech
    Thomsen, Dan
    2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), 2019, : 107 - 112
  • [33] ELECTRONIC OUTSOURCING SECURETY BASED ON CLOUD COMPUTING
    Jamshidi, Fatemeh
    Shaabany, Afshin
    4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING ( ICACTE 2011), 2011, : 99 - 102
  • [34] Rezension „IT-Outsourcing und Cloud Computing“
    Hans-Peter Fröschle
    HMD Praxis der Wirtschaftsinformatik, 2020, 57 (5) : 1079 - 1080
  • [35] Outsourcing computation of modular exponentiations in cloud computing
    Xu Ma
    Jin Li
    Fangguo Zhang
    Cluster Computing, 2013, 16 : 787 - 796
  • [36] Outsourcing computation of modular exponentiations in cloud computing
    Ma, Xu
    Li, Jin
    Zhang, Fangguo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 787 - 796
  • [37] From outsourcing to Cloud computing: evolution of IT services
    Dhar, Subhankar
    MANAGEMENT RESEARCH REVIEW, 2012, 35 (08): : 664 - 675
  • [38] Secure and EfficientRegression Analysis Outsourcing Algorithm for Cloud Server
    Kumar, Malay
    Meena, Jasraj
    Vardhan, Manu
    Jain, Sanjeev
    INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016, 2016,
  • [39] Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing
    Zhang, Tianyi
    Wang, Jian
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 576 - 583
  • [40] Practical Scheme for Secure Outsourcing of Coppersmith's Algorithm
    Liu, Jiayang
    Bi, Jingguo
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2019, PT II, 2019, 11776 : 229 - 240