Table of Contents Author Guidelines Submit a Manuscript
Computational and Mathematical Methods in Medicine
Volume 2014, Article ID 138498, 7 pages
http://dx.doi.org/10.1155/2014/138498
Research Article

Privacy-Preserving Restricted Boltzmann Machine

Yu Li,1 Yuan Zhang,2,3 and Yue Ji4

1Computer Science and Engineering Department, State University of New York at Buffalo, Buffalo, NY 14260, USA
2State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210046, China
3Computer Science and Technology Department, Nanjing University, Nanjing 210046, China
4Tian Jia Bing Hall, Nanjing Normal University, Nanjing 210097, China

Received 5 March 2014; Accepted 31 May 2014; Published 24 June 2014

Academic Editor: Tingting Chen

Copyright © 2014 Yu Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. G. Hinton and T. Sejnowski, “Learning and relearning in Boltzmann machines,” in Parallel Distributed Processing, vol. 1, pp. 282–317, MIT Press, Cambridge, Mass, USA, 1986. View at Google Scholar
  2. A. Mohamed, G. Dahl, and G. Hinton, “Deep belief networks for phone recognition,” in Proceedings of the NIPS Workshop on Deep Learning for Speech Recognition and Related Applications, 2009.
  3. R. Salakhutdinov and G. Hinton, “Replicated softmax: an undirected topic model,” in Proceedings of the 23rd Annual Conference on Neural Information Processing Systems (NIPS '09), vol. 22, pp. 1607–1614, December 2009. View at Scopus
  4. R. Salakhutdinov, A. Mnih, and G. Hinton, “Restricted Boltzmann machines for collaborative filtering,” in Proceedings of the 24th International Conference on Machine learning (ICML '07), vol. 227, pp. 791–798, Corvallis, Oregon, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  5. G. Hinton, “Momentum,” in A Practical Guide to Training Restricted Boltzmann Machines: Version 1, chapter 9, pp. 9–10, 2010. View at Google Scholar
  6. R. Agrawal and R. Srikant, “Privacy-preserving data mining,” ACM Sigmod Record, vol. 29, no. 2, pp. 439–450, 2000. View at Google Scholar · View at Scopus
  7. Y. Lindell and B. Pinkas, “Privacy preserving data mining,” in Advances in Cryptology—CRYPTO 2000, pp. 36–54, Springer, New York, NY, USA, 2000. View at Google Scholar
  8. W. Du and Z. Zhan, “Using randomized response techniques for privacy-preserving data mining,” in Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '03), pp. 505–510, ACM, New York, NY, USA, August 2003. View at Publisher · View at Google Scholar · View at Scopus
  9. Z. Huang, W. Du, and B. Chen, “Deriving private information from randomized data,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '05), pp. 37–48, June 2005. View at Scopus
  10. C. Aggarwal and P. Yu, “A condensation approach to privacy preserving data mining,” in Advances in Database Technology—EDBT 2004, E. Bertino, S. Christodoulakis, D. Plexousakis et al., Eds., vol. 2992 of Lecture Notes in Computer Science, pp. 183–199, 2004. View at Publisher · View at Google Scholar
  11. R. Wright and Z. Yang, “Privacy-preserving Bayesian network structure computation on distributed heterogeneous data,” in Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '04), pp. 713–718, ACM, August 2004. View at Scopus
  12. T. Chen and S. Zhong, “Privacy-preserving backpropagation neural network learning,” IEEE Transactions on Neural Networks, vol. 20, no. 10, pp. 1554–1564, 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. S. Laur, H. Lipmaa, and T. Mielikäihen, “Cryptographically private support vector machines,” in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '06), pp. 618–624, ACM, August 2006. View at Scopus
  14. J. Vaidya, M. Kantarcioglu, C. Clifton, and M. Kantarcıoglu, “Privacy-preserving naive bayes classification,” The VLDB Journal, vol. 17, no. 4, pp. 879–898, 2008. View at Publisher · View at Google Scholar
  15. LISA Lab., “Restricted Boltzmann Machines (RBM),” 2013, http://deeplearning.net/tutorial/rbm.html.
  16. D. Ackley, G. Hinton, and T. Sejnowski, “A learning algorithm for Boltzmann machines,” Cognitive Science, vol. 9, no. 1, pp. 147–169, 1985. View at Publisher · View at Google Scholar · View at Scopus
  17. J. J. Hopfield, “Neural networks and physical systems with emergent collective computational abilities,” Proceedings of the National Academy of Sciences of the United States of America, vol. 79, no. 8, pp. 2554–2558, 1982. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. Y. Bengio, “Learning deep architectures for AI,” Foundations and Trends in Machine Learning, vol. 2, no. 1, pp. 1–27, 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” in Advances in Cryptology, vol. 196 of Lecture Notes in Computer Science, pp. 10–18, Springer, Berlin, Germany, 1985. View at Publisher · View at Google Scholar · View at MathSciNet
  20. Y. Tsiounis and M. Yung, “On the security of elgamal based encryption,” in Public Key Cryptography, pp. 117–134, Springer, Berlin, Germany, 1998. View at Publisher · View at Google Scholar
  21. S. Goldwasser and S. Micali, “Probabilistic encryption,” Journal of Computer and System Sciences, vol. 28, no. 2, pp. 270–299, 1984. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  22. M. Senoussaoui, N. Dehak, P. Kenny, R. Dehak, and P. Dumouchel, “First attempt of Boltzmann machines for speaker verification,” in Proceedings of the Odyssey: The Speaker and Language Recognition Workshop, 2012.