期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Gene Expression Data Classification Using Consensus Independent Component Analysis 被引量:7
1
作者 Chun-Hou Zheng De-Shuang Huang +1 位作者 Xiang-Zhen Kong Xing-Ming Zhao 《Genomics, Proteomics & Bioinformatics》 SCIE CAS CSCD 2008年第2期74-82,共9页
We propose a new method for tumor classification from gene expression data, which mainly contains three steps. Firstly, the original DNA microarray gene expression data are modeled by independent component analysis (... We propose a new method for tumor classification from gene expression data, which mainly contains three steps. Firstly, the original DNA microarray gene expression data are modeled by independent component analysis (ICA). Secondly, the most discriminant eigenassays extracted by ICA are selected by the sequential floating forward selection technique. Finally, support vector machine is used to classify the modeling data. To show the validity of the proposed method, we applied it to classify three DNA microarray datasets involving various human normal and tumor tissue samples. The experimental results show that the method is efficient and feasible. 展开更多
关键词 independent component analysis feature selection support vector machine gene expression data
原文传递
Confidential machine learning on untrusted platforms:a survey
2
作者 Sharma Sagar Chen Keke 《Cybersecurity》 EI CSCD 2021年第1期461-479,共19页
With the ever-growing data and the need for developing powerful machine learning models,data owners increasingly depend on various untrusted platforms(e.g.,public clouds,edges,and machine learning service providers)fo... With the ever-growing data and the need for developing powerful machine learning models,data owners increasingly depend on various untrusted platforms(e.g.,public clouds,edges,and machine learning service providers)for scalable processing or collaborative learning.Thus,sensitive data and models are in danger of unauthorized access,misuse,and privacy compromises.A relatively new body of research confidentially trains machine learning models on protected data to address these concerns.In this survey,we summarize notable studies in this emerging area of research.With a unified framework,we highlight the critical challenges and innovations in outsourcing machine learning confidentially.We focus on the cryptographic approaches for confidential machine learning(CML),primarily on model training,while also covering other directions such as perturbation-based approaches and CML in the hardware-assisted computing environment.The discussion will take a holistic way to consider a rich context of the related threat models,security assumptions,design principles,and associated trade-offs amongst data utility,cost,and confidentiality. 展开更多
关键词 Confidential computing Cryptographic protocols Machine learning
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部