# Secret sharing over KERNEL-BASED DATA MINING SYSTEM(暫時寫的) ## Abstract ## 1. Introduction(最後寫) ### Privacy preserving distributed SVM scheme ### Insiders within organizations collude with outsiders ## 2. Related Work ### A distinction between prior work ### Advantage ### The attacking scenario ### 3. Preliminary ## 需要的前備 knowledge: ##### Support Vector machine - Linear Kernel function ##### Secret Sharing - Randomly split secret share ## 3. The Privacy Preserving Method ### PPSVM Procedure ### System Model ### The Privacy Preserving Method ## 4. Experiment analysis ### Experiment Setup ## 5. Conclusion ### conclude the paper ### future work ### limitation ## References
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up