Search Results - "Aloufi, Asma"
-
1
Effective Activation Functions for Homomorphic Evaluation of Deep Neural Networks
Published in IEEE access (01-01-2020)“…CryptoNets and subsequent work have demonstrated the capability of homomorphic encryption (HE) in the applications of private artificial intelligence (AI). In…”
Get full text
Journal Article -
2
Evaluation of the Adverse Dermatological Effects Due to Frequent Handwashing Accompanying the COVID-19 Pandemic: A Cross-sectional Study
Published in Journal of dermatology & dermatologic surgery (01-07-2023)“…Abstract Background: Washing hands regularly is among the key suggestions the World Health Organization (WHO) made for the general public. However, intensive…”
Get full text
Journal Article -
3
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption
Published in IEEE transactions on dependable and secure computing (01-07-2021)“…Decision tree and its generalization of random forests are a simple yet powerful machine learning model for many classification and regression problems. Recent…”
Get full text
Journal Article -
4
Secure Outsourced Computation on Encrypted Data
Published 01-01-2020“…Homomorphic encryption (HE) is a promising cryptographic technique that supports computations on encrypted data without requiring decryption first. This…”
Get full text
Dissertation -
5
Universal location referencing and homomorphic evaluation of geospatial query
Published in Computers & security (01-03-2021)“…Location data reveals users’ trajectories, yet it is often shared to enable many location-based services (LBS). In this paper, we propose a privacy-preserving…”
Get full text
Journal Article -
6
Collaborative Homomorphic Computation on Data Encrypted under Multiple Keys
Published 11-11-2019“…Homomorphic encryption (HE) is a promising cryptographic technique for enabling secure collaborative machine learning in the cloud. However, support for…”
Get full text
Journal Article -
7
A Cognitive Theory-based Approach for the Evaluation and Enhancement of Internet Security Awareness among Children Aged 3-12 Years
Published 01-01-2015“…In the age of technology, the Internet has spread widely and used for multiple purposes by users of all ages, especially children who start using it frequently…”
Get full text
Dissertation -
8
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey
Published 17-07-2020“…New cryptographic techniques such as homomorphic encryption (HE) allow computations to be outsourced to and evaluated blindfolded in a resourceful cloud. These…”
Get full text
Journal Article