TY - CHAP AU - Malik, M. B. AU - Ghazi, M. A. AU - Ali, R. PY - 2012 DA - 2012// TI - Privacy preserving data mining techniques: current scenario and future prospects BT - Third International Conference on Computer and Communication Technology (ICCCT) PB - IEEE CY - Allahabad ID - Malik2012 ER - TY - STD TI - IDASH 2018. http://www.humangenomeprivacy.org/2018/. Accessed 15 Jan 2019. UR - http://www.humangenomeprivacy.org/2018/ ID - ref2 ER - TY - CHAP AU - Cheon, J. H. AU - Kim, A. AU - Kim, M. AU - Song, Y. PY - 2017 DA - 2017// TI - Homomorphic encryption for arithmetic of approximate numbers BT - Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the Theory and Application of Cryptology and Information Security PB - Springer CY - Cham ID - Cheon2017 ER - TY - CHAP AU - Cheon, J. H. AU - Han, K. AU - Kim, A. AU - Kim, M. AU - Song, Y. PY - 2018 DA - 2018// TI - Bootstrapping for approximate homomorphic encryption BT - Annual International Conference on the Theory and Applications of Cryptographic Techniques PB - Springer CY - Cham ID - Cheon2018 ER - TY - STD TI - Han K, Kim A, Kim M, Song Y. Implementation of HEAAN. https://github.com/snucrypto/HEAAN. Accessed 12 July 2018. UR - https://github.com/snucrypto/HEAAN ID - ref5 ER - TY - CHAP AU - Lauter, K. AU - López-Alt, A. AU - Naehrig, M. PY - 2014 DA - 2014// TI - Private computation on encrypted genomic data BT - International Conference on Cryptology and Information Security in Latin America PB - Springer CY - Cham ID - Lauter2014 ER - TY - JOUR AU - Wang, S. AU - Zhang, Y. AU - Dai, W. AU - Lauter, K. AU - Kim, M. AU - Tang, Y. AU - Xiong, H. AU - Jiang, X. PY - 2015 DA - 2015// TI - Healer: homomorphic computation of exact logistic regression for secure rare disease variants analysis in GWAS JO - Bioinformatics VL - 32 ID - Wang2015 ER - TY - JOUR AU - Kim, A. AU - Song, Y. AU - Kim, M. AU - Lee, K. AU - Cheon, J. H. PY - 2018 DA - 2018// TI - Logistic regression model training based on the approximate homomorphic encryption JO - BMC Med Genet VL - 11 ID - Kim2018 ER - TY - JOUR AU - Chen, H. AU - Gilad-Bachrach, R. AU - Han, K. AU - Huang, Z. AU - Jalali, A. AU - Laine, K. AU - Lauter, K. PY - 2018 DA - 2018// TI - Logistic regression over encrypted data from fully homomorphic encryption JO - BMC Med Genet VL - 11 ID - Chen2018 ER - TY - CHAP AU - Crawford, J. L. AU - Gentry, C. AU - Halevi, S. AU - Platt, D. AU - Shoup, V. PY - 2018 DA - 2018// TI - Doing real work with FHE: The case of logistic regression BT - Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography PB - ACM CY - New York ID - Crawford2018 ER - TY - JOUR AU - Bonte, C. AU - Vercauteren, F. PY - 2018 DA - 2018// TI - Privacy-preserving logistic regression training JO - BMC Med Genet VL - 11 ID - Bonte2018 ER - TY - STD TI - IDASH 2017. http://www.humangenomeprivacy.org/2017/. Accessed 15 Jan 2019. UR - http://www.humangenomeprivacy.org/2017/ ID - ref12 ER - TY - CHAP AU - Lu, W. AU - Yamada, Y. AU - Sakuma, J. PY - 2015 DA - 2015// TI - Efficient secure outsourcing of genome-wide association studies BT - 2015 IEEE Security and Privacy Workshops PB - IEEE CY - USA ID - Lu2015 ER - TY - JOUR AU - Bonte, C. AU - Makri, E. AU - Ardeshirdavani, A. AU - Simm, J. AU - Moreau, Y. AU - Vercauteren, F. PY - 2018 DA - 2018// TI - Towards practical privacy-preserving genome-wide association study JO - BMC Bioinformatics VL - 19 UR - https://doi.org/10.1186/s12859-018-2541-3 DO - 10.1186/s12859-018-2541-3 ID - Bonte2018 ER - TY - JOUR AU - Jagadeesh, K. A. AU - Wu, D. J. AU - Birgmeier, J. A. AU - Boneh, D. AU - Bejerano, G. PY - 2017 DA - 2017// TI - Deriving genomic diagnoses without revealing patient genomes JO - Science VL - 357 UR - https://doi.org/10.1126/science.aam9710 DO - 10.1126/science.aam9710 ID - Jagadeesh2017 ER - TY - JOUR AU - Cho, H. AU - Wu, D. J. AU - Berger, B. PY - 2018 DA - 2018// TI - Secure genome-wide association analysis using multiparty computation JO - Nat Biotechnol VL - 36 UR - https://doi.org/10.1038/nbt.4108 DO - 10.1038/nbt.4108 ID - Cho2018 ER - TY - JOUR AU - Kamm, L. AU - Bogdanov, D. AU - Laur, S. AU - Vilo, J. PY - 2013 DA - 2013// TI - A new way to protect privacy in large-scale genome-wide association studies JO - Bioinformatics VL - 29 UR - https://doi.org/10.1093/bioinformatics/btt066 DO - 10.1093/bioinformatics/btt066 ID - Kamm2013 ER - TY - JOUR AU - Constable, S. D. AU - Tang, Y. AU - Wang, S. AU - Jiang, X. AU - Chapin, S. PY - 2015 DA - 2015// TI - Privacy-preserving GWAS analysis on federated genomic datasets JO - BMC Med Inform Decis Making VL - 15 UR - https://doi.org/10.1186/1472-6947-15-S5-S2 DO - 10.1186/1472-6947-15-S5-S2 ID - Constable2015 ER - TY - JOUR AU - Bogdanov, D. AU - Kamm, L. AU - Laur, S. AU - Sokk, V. PY - 2018 DA - 2018// TI - Implementation and evaluation of an algorithm for cryptographically private principal component analysis on genomic data JO - IEEE/ACM Trans Comput Biol Bioinforma VL - 15 ID - Bogdanov2018 ER - TY - JOUR AU - Chen, F. AU - Wang, S. AU - Jiang, X. AU - Ding, S. AU - Lu, Y. AU - Kim, J. AU - Sahinalp, S. C. AU - Shimizu, C. AU - Burns, J. C. AU - Wright, V. J. PY - 2016 DA - 2016// TI - Princess: Privacy-protecting rare disease international network collaboration via encryption through software guard extensions JO - Bioinformatics VL - 33 ID - Chen2016 ER - TY - CHAP AU - Anati, I. AU - Gueron, S. AU - Johnson, S. AU - Scarlata, V. PY - 2013 DA - 2013// TI - Innovative technology for cpu based attestation and sealing BT - Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy vol. 13 PB - ACM CY - New York ID - Anati2013 ER - TY - JOUR AU - Kim, M. AU - Song, Y. AU - Wang, S. AU - Xia, Y. AU - Jiang, X. PY - 2018 DA - 2018// TI - Secure logistic regression based on homomorphic encryption: Design and evaluation JO - JMIR Med Inform VL - 6 UR - https://doi.org/10.2196/medinform.8805 DO - 10.2196/medinform.8805 ID - Kim2018 ER - TY - JOUR AU - Cheon, J. H. AU - Kim, D. AU - Kim, Y. AU - Song, Y. PY - 2018 DA - 2018// TI - Ensemble method for privacy-preserving logistic regression based on homomorphic encryption JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2866697 DO - 10.1109/ACCESS.2018.2866697 ID - Cheon2018 ER - TY - JOUR AU - Cheon, J. H. AU - Han, K. AU - Hong, S. M. AU - Kim, H. J. AU - Kim, J. AU - Kim, S. AU - Seo, H. AU - Shim, H. AU - Song, Y. PY - 2018 DA - 2018// TI - Toward a secure drone system: Flying with real-time homomorphic authenticated encryption JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2819189 DO - 10.1109/ACCESS.2018.2819189 ID - Cheon2018 ER - TY - JOUR AU - Albrecht, M. R. AU - Player, R. AU - Scott, S. PY - 2015 DA - 2015// TI - On the concrete hardness of learning with errors JO - J Math Cryptol VL - 9 UR - https://doi.org/10.1515/jmc-2015-0016 DO - 10.1515/jmc-2015-0016 ID - Albrecht2015 ER - TY - STD TI - Albrecht MR. A sage module for estimating the concrete security of learning with errors instances. https://bitbucket.org/malb/lwe-estimator. Accessed 15 July 2018. UR - https://bitbucket.org/malb/lwe-estimator ID - ref26 ER - TY - JOUR AU - Sikorska, K. AU - Lesaffre, E. AU - Groenen, P. F. AU - Eilers, P. H. PY - 2013 DA - 2013// TI - Gwas on your notebook: fast semi-parallel linear and logistic regression for genome-wide association studies JO - BMC Bioinformatics VL - 14 UR - https://doi.org/10.1186/1471-2105-14-166 DO - 10.1186/1471-2105-14-166 ID - Sikorska2013 ER - TY - JOUR AU - Longford, N. T. PY - 1987 DA - 1987// TI - A fast scoring algorithm for maximum likelihood estimation in unbalanced mixed models with nested random effects JO - Biometrika VL - 74 UR - https://doi.org/10.1093/biomet/74.4.817 DO - 10.1093/biomet/74.4.817 ID - Longford1987 ER - TY - STD TI - Ruder S. An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747. 2016. ID - ref29 ER - TY - CHAP AU - Juvekar, C. AU - Vaikuntanathan, V. AU - Chandrakasan, A. PY - 2018 DA - 2018// TI - Gazelle: A low latency framework for secure neural network inference BT - 27th USENIX Security Symposium (USENIX Security 18) PB - USENIX Association CY - Berkeley ID - Juvekar2018 ER - TY - STD TI - Goldschmidt RE. Applications of division by convergence. PhD thesis, Massachusetts Institute of Technology. 1964. ID - ref31 ER - TY - JOUR AU - Markstein, P. PY - 2004 DA - 2004// TI - Software division and square root using goldschmidt’s algorithms JO - Proc 6th Conf Real Numbers Comput (RNC’6) VL - 123 ID - Markstein2004 ER - TY - CHAP AU - Chinchor, N. PY - 1992 DA - 1992// TI - Muc-4 evaluation metrics BT - Proceedings of the 4th Conference on Message Understanding PB - Association for Computational Linguistics CY - USA ID - Chinchor1992 ER -