{"id":3968,"date":"2024-04-03T01:36:21","date_gmt":"2024-04-02T23:36:21","guid":{"rendered":"https:\/\/nepttp.avidakizomba.co.za\/?p=3968"},"modified":"2025-06-09T12:19:09","modified_gmt":"2025-06-09T10:19:09","slug":"comparative-analysis-of-logistic-regression-over-homomorphically-encrypted-data-and-decrypted-data","status":"publish","type":"post","link":"https:\/\/www.escience.ac.za\/index.php\/2024\/04\/03\/comparative-analysis-of-logistic-regression-over-homomorphically-encrypted-data-and-decrypted-data\/","title":{"rendered":"Comparative Analysis of Logistic Regression over Homomorphically Encrypted Data and Decrypted Data"},"content":{"rendered":"<p><strong>Researcher:<\/strong> Linhle Mbombo, University of Venda<br \/><strong>Supervisor:<\/strong> Professor Augustine Munagi and Professor Turgay \u00c7elik, University of the Witwatersrand, Johannesburg<\/p><p>Machine learning (ML) algorithms is improving auto-mated tasks, using data to make predictions and solve clustering problems. The data that is used to fit the model is from institutions, organizations, etc. that have sensitive data. Such as personal, medical and financial data. The research seeks to bridge the security gab and design secure measures of preserving the privacy of data used in the process. Homomorphic encryption concept allows computations on encrypted data. The research uses Paillier algorithm for an encryption scheme.<\/p><p><br \/><\/p>","protected":false},"excerpt":{"rendered":"<p>Researcher: Linhle Mbombo, University of VendaSupervisor: Professor Augustine Munagi and Professor Turgay \u00c7elik, University of the Witwatersrand, Johannesburg Machine learning (ML) algorithms is improving auto-mated tasks, using data to make predictions and solve clustering problems. The data that is used to fit the model is from institutions,<\/p>\n","protected":false},"author":1,"featured_media":4493,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-3968","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-capstone-projects"],"_links":{"self":[{"href":"https:\/\/www.escience.ac.za\/index.php\/wp-json\/wp\/v2\/posts\/3968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.escience.ac.za\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.escience.ac.za\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.escience.ac.za\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.escience.ac.za\/index.php\/wp-json\/wp\/v2\/comments?post=3968"}],"version-history":[{"count":1,"href":"https:\/\/www.escience.ac.za\/index.php\/wp-json\/wp\/v2\/posts\/3968\/revisions"}],"predecessor-version":[{"id":4483,"href":"https:\/\/www.escience.ac.za\/index.php\/wp-json\/wp\/v2\/posts\/3968\/revisions\/4483"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.escience.ac.za\/index.php\/wp-json\/wp\/v2\/media\/4493"}],"wp:attachment":[{"href":"https:\/\/www.escience.ac.za\/index.php\/wp-json\/wp\/v2\/media?parent=3968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.escience.ac.za\/index.php\/wp-json\/wp\/v2\/categories?post=3968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.escience.ac.za\/index.php\/wp-json\/wp\/v2\/tags?post=3968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}