Author:
Kumbhar Hemant Ramdas,Srinivasa Rao S.
Reference25 articles.
1. Roberts, J.C., Al-Hamdani, W.: Who can you trust in the cloud?, pp. 15–19 (2011)
2. Hua, W., Learning, A.R.: A brief review of machine learning and its application. In: 2009 International Conference on Information Engineering and Computer Science (ICIECS 2009), p. 1 (2009)
3. Rangasami, K., Vagdevi, S.: Comparative study of homomorphic encryption methods for secured data operations in cloud computing. In: 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), vol. 2018, pp. 551–556 (2018)
4. Mendes, R., Ao, J.O.: Privacy-Preserving Data Mining : Methods, Metrics, and Applications, vol. 5 (2018)
5. Shokri, R., Shmatikov, V.: Privacy-Preserving Deep Learning ∗, pp. 909–910 (2015)