A personalized approach to cancer treatment: how biomarkers can help, Clinical chemistry, vol.54, issue.11, pp.1770-1779, 2008. ,
The Cancer Cell Line Encyclopedia enables predictive modelling of anticancer drug sensitivity, Nature, vol.53, issue.7391, pp.483603-607, 2012. ,
DOI : 10.1002/pbc.20697
Systematic identification of genomic markers of drug sensitivity in cancer cells, Nature, issue.7391, pp.483570-575, 2012. ,
Data mining approaches for genomic biomarker development: Applications using drug screening data from the cancer genome project and the cancer cell line encyclopedia, PloS one, vol.10, issue.7, p.127433, 2015. ,
Systematic assessment of analytical methods for drug sensitivity prediction from cancer cell line data, Pacific Symposium on Biocomputing. Pacific Symposium on Biocomputing, p.63, 2014. ,
Routes for breaching and protecting genetic privacy, Nature Reviews Genetics, vol.2008, issue.6, pp.409-421, 2014. ,
DOI : 10.1371/journal.pgen.1000008
URL : https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4151119/pdf
Bayesian method to predict individual snp genotypes from gene expression data, Nature genetics, vol.44, issue.5, pp.603-608, 2012. ,
Regression shrinkage and selection via the lasso, Journal of the Royal Statistical Society. Series B (Methodological), pp.267-288, 1996. ,
DOI : 10.1111/j.1467-9868.2011.00771.x
glmnet: Lasso and elasticnet regularized generalized linear models, 2009. ,
Regularization and variable selection via the elastic net, Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol.5, issue.2, pp.301-320, 2005. ,
DOI : 10.1073/pnas.201162998
Slep: Sparse learning with efficient projections, p.491, 2009. ,
Accelerated proximal stochastic dual coordinate ascent for regularized loss minimization, ICML, pp.64-72, 2014. ,
DOI : 10.1023/A:1012498226479
A reduction of the elastic net to support vector machines with an application to gpu computing, Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015. ,
Privacy-preserving outsourcing support vector machines with random transformation, Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '10, pp.363-372, 2010. ,
DOI : 10.1145/1835804.1835852
Cryptographically private support vector machines, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '06, pp.618-624, 2006. ,
DOI : 10.1145/1150402.1150477
Oblivious evaluation of multivariate polynomials, Journal of Mathematical Cryptology, vol.7, issue.1, pp.1-29, 2013. ,
DOI : 10.1515/jmc-2012-0007
Encrypted SVM for Outsourced Data Mining, 2015 IEEE 8th International Conference on Cloud Computing, pp.1085-1092, 2015. ,
DOI : 10.1109/CLOUD.2015.158
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data, Proceedings of the 2006 ACM symposium on Applied computing , SAC '06, pp.603-610, 2006. ,
DOI : 10.1145/1141277.1141415
Privacy-Preserving SVM Classification on Vertically Partitioned Data, Advances in Knowledge Discovery and Data Mining, pp.647-656, 2006. ,
DOI : 10.1007/11731139_74
Privacy-preserving SVM classification, Knowledge and Information Systems, vol.13, issue.4, pp.161-178, 2008. ,
DOI : 10.3233/JCS-2005-13401
On the impossibility of cryptography alone for privacy-preserving cloud computing. HotSec, pp.1-8, 2010. ,
Two-party computation model for privacy-preserving queries over distributed databases, NDSS, 2009. ,
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing, IEEE transactions on information forensics and security, pp.1053-1066, 2012. ,
DOI : 10.1109/TIFS.2012.2190726
URL : http://eprints.eemcs.utwente.nl/23717/01/TIFS2012.pdf
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation, Proceedings 2015 Network and Distributed System Security Symposium, 2015. ,
DOI : 10.14722/ndss.2015.23113
Secret charing vs. encryption-based techniques for privacy preserving data mining, 2007. ,
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption, Proceedings of the 44th symposium on Theory of Computing, STOC '12, pp.1219-1234, 2012. ,
DOI : 10.1145/2213977.2214086
Efficiently outsourcing multiparty computation under multiple keys. Information Forensics and Security, IEEE Transactions on, vol.8, issue.12, pp.2046-2058, 2013. ,
DOI : 10.1109/tifs.2013.2288131
Computing encrypted cloud data efficiently under multiple keys, Communications and Network Security (CNS), 2013 IEEE Conference on, pp.504-513, 2013. ,
A tale of two clouds: Computing on data encrypted under multiple keys, 2014 IEEE Conference on Communications and Network Security, pp.337-345, 2014. ,
DOI : 10.1109/CNS.2014.6997502
Divertible protocols and atomic proxy cryptography, Advances in CryptologyEUROCRYPT'98, pp.127-144, 1998. ,
DOI : 10.1007/BFb0054122
Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1518-1529, 2015. ,
DOI : 10.1007/978-3-642-13190-5_2
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications, Advances in Cryptology-ASIACRYPT 2003, pp.37-54, 2003. ,
DOI : 10.1007/978-3-540-40061-5_3
URL : http://www.di.ens.fr/users/pointche/Documents/Papers/2003_asiacryptB.pdf
Genomics of Drug Sensitivity in Cancer (GDSC): a resource for therapeutic biomarker discovery in cancer cells, Nucleic Acids Research, vol.41, issue.D1, pp.41-955, 2013. ,
DOI : 10.1093/nar/gks1111
An equivalence between the lasso and support vector machines. Regularization, Optimization, Kernels, and Support Vector Machines, pp.1-26, 2014. ,
Efficient homomorphic encryption on integer vectors and its applications, 2014 Information Theory and Applications Workshop (ITA), pp.1-9, 2014. ,
DOI : 10.1109/ITA.2014.6804228
URL : http://ita.ucsd.edu/workshop/14/files/paper/paper_3205.pdf
Evaluating 2-DNF Formulas on Ciphertexts, Theory of Cryptography Conference, pp.325-341, 2005. ,
DOI : 10.1007/978-3-540-30576-7_18
URL : http://www.iacr.org/cryptodb/archive/2005/TCC/3602/3602.pdf
Estimation of prediction error by using K-fold cross-validation, Statistics and Computing, vol.35, issue.3, pp.137-146, 2011. ,
DOI : 10.1214/009053607000000514
Foundations of cryptography, 2004. ,
DOI : 10.1017/cbo9780511546891
Secure kNN computation on encrypted databases, Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD '09, pp.139-152, 2009. ,
DOI : 10.1145/1559845.1559862
An implementation of homomorphic encryption. https://github.com/shaih ,
Building support vector machines with reduced classifier complexity, Journal of Machine Learning Research, vol.7, pp.1493-1515, 2006. ,
Non-interactive and information-theoretic secure verifiable secret sharing, Annual International Cryptology Conference, pp.129-140, 1991. ,
A dual coordinate descent method for large-scale linear SVM, Proceedings of the 25th international conference on Machine learning, ICML '08, pp.408-415, 2008. ,
DOI : 10.1145/1390156.1390208
URL : http://www.csie.ntu.edu.tw/~cjlin/papers/cddual.pdf
Parallel support vector machines in practice, 2014. ,
Training a Support Vector Machine in the Primal, Neural Computation, vol.6, issue.5, pp.1155-1178, 2007. ,
DOI : 10.1198/106186005X25619