The pinkas dataset
… the difficulty of recognizing the words in the Pinkas dataset. Segmentation based methods
are siamese CNN and PHOCNet, segmentation free method is exemplar SVM. In all …
are siamese CNN and PHOCNet, segmentation free method is exemplar SVM. In all …
The HHD dataset
… The only Hebrew dataset we are aware of is the Pinkas historical dataset [11], which contains
30 pages from the Pinkas … comprehensive Hebrew dataset, or any other Hebrew dataset. …
30 pages from the Pinkas … comprehensive Hebrew dataset, or any other Hebrew dataset. …
Secure Computation of the k th -Ranked Element
… large, confidential datasets, we consider the problem of securely computing the kth … We also
consider this problem in the multi-party case. In the setting we consider, the datasets DA and …
consider this problem in the multi-party case. In the setting we consider, the datasets DA and …
Secure statistical analysis on multiple datasets: Join and group-by
… , and then apply some aggregation summary on the rows (such as sum, count, … the honest
majority setting and against malicious adversaries. To the best of our knowledge, this is the …
majority setting and against malicious adversaries. To the best of our knowledge, this is the …
Efficient private matching and set intersection
… (benny.pinkas@hp.com) … We consider the problem of computing the intersection of private
datasets of two parties, where the datasets contain lists of elements taken from a large domain…
datasets of two parties, where the datasets contain lists of elements taken from a large domain…
SARS-CoV-2 detection from voice
G Pinkas, Y Karny, A Malachi, G Barkai… - IEEE Open Journal …, 2020 - ieeexplore.ieee.org
… Semi-supervised learning combines unsupervised pretraining of DNNs on large unlabeled
dataset of recordings, followed by fine-tuning of the pre-trained DNN using smaller, labelled …
dataset of recordings, followed by fine-tuning of the pre-trained DNN using smaller, labelled …
Make some room for the zeros: Data sparsity in secure distributed machine learning
… of rows of a dataset, ie batches, the sparsity metric is revealed about the batch. In … We show
that this is the case in the context of concrete real-world datasets in Section 8. Hence, the call …
that this is the case in the context of concrete real-world datasets in Section 8. Hence, the call …
Secure deduplication of encrypted data without additional independent servers
… the effectiveness and the efficiency of our scheme, via simulations using realistic datasets
… We map each dataset to a stream of upload requests by generating the requests in random …
… We map each dataset to a stream of upload requests by generating the requests in random …
Efficient scalable multiparty private set-intersection via garbled bloom filters
… All our protocols are highly efficient and scale well as the number of parties and the size of
each data set grow. We implemented all three constructions and ran extensive experiments to …
each data set grow. We implemented all three constructions and ran extensive experiments to …
Practical multi-party private set intersection from symmetric-key techniques
… the practicality of our protocols with an implementation. To the best of our knowledge, this is
the … For 5 parties with data-sets of 220 items each, our protocol requires only 72 seconds. In …
the … For 5 parties with data-sets of 220 items each, our protocol requires only 72 seconds. In …