Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data
暂无分享,去创建一个
Zhangjie Fu | Jian Weng | Kui Ren | Cong Wang | Fengxiao Huang | K. Ren | J. Weng | Zhangjie Fu | Cong Wang | Fengxiao Huang
[1] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[2] Sai Ji,et al. Towards efficient content-aware search over encrypted outsourced data in cloud , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[3] P. Vishvapathi,et al. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .
[4] Melissa Chase,et al. Structured Encryption and Controlled Disclosure , 2010, IACR Cryptol. ePrint Arch..
[5] Zhiyong Peng,et al. Highly Efficient Indexing for Privacy-Preserving Multi-keyword Query over Encrypted Cloud Data , 2014, WAIM.
[6] Minjie Zhang,et al. A belief propagation-based method for task allocation in open and dynamic cloud environments , 2017, Knowl. Based Syst..
[7] Ilsun You,et al. Verifiable Auditing for Outsourced Database in Cloud Computing , 2015, IEEE Transactions on Computers.
[8] Bin Gu,et al. A Robust Regularization Path Algorithm for $\nu $ -Support Vector Classification , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[9] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[10] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[11] Noah A. Smith,et al. Extracting Simplified Statements for Factual Question Generation , 2010 .
[12] Marianne Winslett,et al. Zerber: r-confidential indexing for distributed documents , 2008, EDBT '08.
[13] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[14] Elisa Bertino,et al. Private Searching on Streaming Data Based on Keyword Frequency , 2014, IEEE Transactions on Dependable and Secure Computing.
[15] Rui Li,et al. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing , 2014, Proc. VLDB Endow..
[16] Geong Sen Poh,et al. Structured Encryption for Conceptual Graphs , 2012, IWSEC.
[17] John F. Sowa,et al. Conceptual Structures: Information Processing in Mind and Machine , 1983 .
[18] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..
[19] Jin Wang,et al. Privacy-Preserving Smart Similarity Search Based on Simhash over Encrypted Data in Cloud Computing , 2015 .
[20] Ming Li,et al. Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2013, IEEE Transactions on Parallel and Distributed Systems.
[21] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[22] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[23] 简志华. High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia , 2016 .
[24] Xiaodong Liu,et al. A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment , 2016, Secur. Commun. Networks.
[25] Alexander F. Gelbukh,et al. Summarizing Conceptual Graphs for Automatic Summarization Task , 2013, ICCS.
[26] Xingming Sun,et al. Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data , 2019, IEEE Transactions on Services Computing.
[27] Ming Liu,et al. Using Wikipedia and Conceptual Graph Structures to Generate Questions for Academic Writing Support , 2012, IEEE Transactions on Learning Technologies.
[28] John F. Sowa,et al. Chapter 5 Conceptual Graphs , 2008 .
[29] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[30] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[31] Jin Wang,et al. Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .
[32] R. Vidhyalakshmi,et al. Enabling secure outsourced cloud data , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).
[33] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[34] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[35] Ruixuan Li,et al. Efficient multi-keyword ranked query over encrypted data in cloud computing , 2014, Future Gener. Comput. Syst..
[36] Ming Li,et al. Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[37] Qing Tian,et al. Cross-heterogeneous-database age estimation through correlation representation learning , 2017, Neurocomputing.
[38] Yong Yu,et al. Conceptual Graph Matching for Semantic Search , 2002, ICCS.
[39] Baisa L. Gunjal,et al. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing , 2016 .
[40] Xingming Sun,et al. Semantic keyword search based on trie over encrypted cloud data , 2014, SCC '14.
[41] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[42] Xingming Sun,et al. Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query , 2014, IEEE Transactions on Consumer Electronics.
[43] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[44] Alistair Moffat,et al. Exploring the similarity space , 1998, SIGF.
[45] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[46] V. Sridhar Reddy,et al. An Efficient Privacy-Preserving Ranked Keyword Search Method , 2018 .
[47] John Dunnion,et al. Automatically building conceptual graphs using VerbNet and WordNet , 2004, ISICT.
[48] G. Lakpathi,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .
[49] George D. C. Cavalcanti,et al. Assessing sentence scoring techniques for extractive text summarization , 2013, Expert Syst. Appl..