The pinkas dataset

BK Barakat, J El-Sana, I Rabaev - … International Conference on …, 2019 - ieeexplore.ieee.org
the difficulty of recognizing the words in the Pinkas dataset. Segmentation based methods
are siamese CNN and PHOCNet, segmentation free method is exemplar SVM. In all …

The HHD dataset

I Rabaev, BK Barakat, A Churkin… - 2020 17th International …, 2020 - ieeexplore.ieee.org
The only Hebrew dataset we are aware of is the Pinkas historical dataset [11], which contains
30 pages from the Pinkas … comprehensive Hebrew dataset, or any other Hebrew dataset. …

Secure Computation of the k th -Ranked Element

G Aggarwal, N Mishra, B Pinkas - … 2004: International Conference on the …, 2004 - Springer
… large, confidential datasets, we consider the problem of securely computing the kth … We also
consider this problem in the multi-party case. In the setting we consider, the datasets DA and …

Secure statistical analysis on multiple datasets: Join and group-by

…, K Hamada, R Kikuchi, A Nof, B Pinkas… - … the 2023 ACM SIGSAC …, 2023 - dl.acm.org
… , and then apply some aggregation summary on the rows (such as sum, count, … the honest
majority setting and against malicious adversaries. To the best of our knowledge, this is the

Efficient private matching and set intersection

MJ Freedman, K Nissim, B Pinkas - International conference on the theory …, 2004 - Springer
… (benny.pinkas@hp.com) … We consider the problem of computing the intersection of private
datasets of two parties, where the datasets contain lists of elements taken from a large domain…

SARS-CoV-2 detection from voice

G Pinkas, Y Karny, A Malachi, G Barkai… - IEEE Open Journal …, 2020 - ieeexplore.ieee.org
… Semi-supervised learning combines unsupervised pretraining of DNNs on large unlabeled
dataset of recordings, followed by fine-tuning of the pre-trained DNN using smaller, labelled …

Make some room for the zeros: Data sparsity in secure distributed machine learning

…, A Gascón, M Raykova, B Pinkas - … of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
… of rows of a dataset, ie batches, the sparsity metric is revealed about the batch. In … We show
that this is the case in the context of concrete real-world datasets in Section 8. Hence, the call …

Secure deduplication of encrypted data without additional independent servers

J Liu, N Asokan, B Pinkas - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
the effectiveness and the efficiency of our scheme, via simulations using realistic datasets
… We map each dataset to a stream of upload requests by generating the requests in random …

Efficient scalable multiparty private set-intersection via garbled bloom filters

R Inbar, E Omri, B Pinkas - … conference on security and cryptography for …, 2018 - Springer
… All our protocols are highly efficient and scale well as the number of parties and the size of
each data set grow. We implemented all three constructions and ran extensive experiments to …

Practical multi-party private set intersection from symmetric-key techniques

V Kolesnikov, N Matania, B Pinkas, M Rosulek… - … the 2017 ACM SIGSAC …, 2017 - dl.acm.org
the practicality of our protocols with an implementation. To the best of our knowledge, this is
the … For 5 parties with data-sets of 220 items each, our protocol requires only 72 seconds. In …