A Secure and Practical Mechanism for Outsourcing ELMs in Cloud Computing

被引:0
|
作者
Lin, Jiarun [1 ]
Yin, Jianping [1 ]
Cai, Zhiping [1 ]
Liu, Qiang [1 ]
Li, Kuan [1 ]
Leung, Victor C. M. [2 ]
机构
[1] Natl Univ Def Technol, Changsha, Hunan, Peoples R China
[2] Univ British Columbia, Vancouver, BC V5Z 1M9, Canada
关键词
EXTREME LEARNING-MACHINE; REGRESSION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
引用
收藏
页码:35 / 38
页数:4
相关论文
共 50 条
  • [41] Dynamic data integrity auditing for secure outsourcing in the cloud
    Wei, Jinxia
    Zhang, Ru
    Liu, Jianyi
    Li, Jing
    Niu, Xinxin
    Yao, Yuangang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (12):
  • [42] A Domain Specific Language for Secure Outsourcing of Computatation to the Cloud
    Nassar, Mohamed
    Erradi, Abdelkarim
    Malluhi, Qutaibah M.
    PROCEEDINGS OF THE 2015 IEEE 19TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, 2015, : 134 - 141
  • [43] A Model Driven Framework for Secure Outsourcing of Computation to the Cloud
    Nassar, Mohamed
    Erradi, Abdelkarim
    Sabry, Farida
    Malluhi, Qutaihah M.
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 968 - 969
  • [44] Secure torage of Data in Cloud Computing
    Fu, Zhangjie
    Cao, Xinyue
    Wang, Jin
    Sun, Xingming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 783 - 786
  • [45] Secure storage of data in cloud computing
    20150500466883
    (1) School of Computer and Software and Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing; 210044, China, 1600, IEEE Tainan Section; International Society of Management Engineers; JSPS/NSFC/NRF A3 Foresight Program Ultra-Realistic Acoustic Interactive Communication on Next-Generation Internet; Tainan Chapter of IEEE Signal Processing Society; Waseda University (Institute of Electrical and Electronics Engineers Inc.):
  • [46] A hybrid algorithm for secure cloud computing
    Das D.
    International Journal of Wireless and Mobile Computing, 2020, 18 (02) : 116 - 122
  • [47] A Secure Cloud Computing Scaling Model
    Lei, Mingyue
    Huang, Zheng
    Wen, Qiaoyan
    Hu, Chunye
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 60 - 66
  • [48] Cryptographic Protocols for Secure Cloud Computing
    Alhumrani, S. A.
    Kar, Jayaprakash
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 301 - 310
  • [49] Secure Document Service for Cloud Computing
    Xu, Jin-Song
    Huang, Ru-Cheng
    Huang, Wan-Ming
    Yang, Geng
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 541 - +
  • [50] Secure Sharing of Data in Cloud Computing
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 24 - 35