Efficient secure outsourcing of large-scale linear systems of equations
暂无分享,去创建一个
Xuhui Chen | Pan Li | Changqing Luo | Sergio Salinas | Sergio Salinas | Xuhui Chen | Pan Li | Changqing Luo
[1] Cong Wang,et al. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud , 2013, IEEE Transactions on Emerging Topics in Computing.
[2] Tingwen Huang,et al. Outsourcing Large Matrix Inversion Computation to A Public Cloud , 2013, IEEE Transactions on Cloud Computing.
[3] Christos Faloutsos,et al. Pegasus: Mining billion-scale graphs in the cloud , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[4] Henry Stark,et al. Probability, Statistics, and Random Processes for Engineers , 2011 .
[5] Farrokh Albuyeh,et al. Grid of the future , 2009, IEEE Power and Energy Magazine.
[6] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[7] Daniel M. Batista,et al. A Survey of Large Scale Data Management Approaches in Cloud Environments , 2011, IEEE Communications Surveys & Tutorials.
[8] Takuji Nishimura,et al. Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.
[9] Edmund Kohlwey,et al. Leveraging the Cloud for Big Data Biometrics: Meeting the Performance Requirements of the Next Generation Biometric Systems , 2011, 2011 IEEE World Congress on Services.
[10] Rowland R Kao,et al. Supersize me: how whole-genome sequencing and big data are transforming epidemiology , 2014, Trends in Microbiology.
[11] G. Nolan,et al. Computational solutions to large-scale data management and analysis , 2010, Nature Reviews Genetics.
[12] Tim Kraska,et al. Finding the Needle in the Big Data Systems Haystack , 2013, IEEE Internet Computing.
[13] Yogesh L. Simmhan,et al. Cloud-Based Software Platform for Big Data Analytics in Smart Grids , 2013, Computing in Science & Engineering.
[14] Cong Wang,et al. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations , 2013, IEEE Transactions on Parallel and Distributed Systems.
[15] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[16] Tao Xiang,et al. Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud , 2014, J. Parallel Distributed Comput..
[17] 2015 IEEE Conference on Computer Communications, INFOCOM 2015, Kowloon, Hong Kong, April 26 - May 1, 2015 , 2015, IEEE Conference on Computer Communications.
[18] Stephen J. Wright,et al. Numerical Optimization , 2018, Fundamental Statistical Inference.
[19] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[20] Gene H. Golub,et al. Matrix computations , 1983 .
[21] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[22] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[23] Der-Jiunn Deng,et al. Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social Data , 2011, IEEE Journal on Selected Areas in Communications.
[24] Dursun Delen,et al. Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud , 2013, Decis. Support Syst..