PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud
暂无分享,去创建一个
Yunhao Liu | Xiang-Yang Li | Kebin Liu | Lan Zhang | Taeho Jung | Xuan Ding | Jiaxi Gu
[1] Sara Bouchenak,et al. Benchmarking Dependability of MapReduce Systems , 2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems.
[2] Andrew Zisserman,et al. Video Google: a text retrieval approach to object matching in videos , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.
[3] Yunhao Liu,et al. POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[4] Qian Wang,et al. Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data , 2016, IEEE Transactions on Image Processing.
[5] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[6] Cordelia Schmid,et al. Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search , 2008, ECCV.
[7] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[8] Mahadev Satyanarayanan,et al. Scalable crowd-sourcing of video from mobile devices , 2013, MobiSys '13.
[9] David G. Lowe,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004, International Journal of Computer Vision.
[10] Laurent Amsaleg,et al. Indexing and searching 100M images with map-reduce , 2013, ICMR.
[11] Hong Jiang,et al. Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems , 2016, IEEE Transactions on Parallel and Distributed Systems.
[12] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[13] Xiang-Yang Li,et al. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel , 2015, IEEE Transactions on Dependable and Secure Computing.
[14] Cordelia Schmid,et al. Improving Bag-of-Features for Large Scale Image Search , 2010, International Journal of Computer Vision.
[15] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[16] Zhihua Xia,et al. Secure semantic expansion based search over encrypted cloud data supporting similarity ranking , 2014, Journal of Cloud Computing.
[17] João Leitão,et al. Privacy-Preserving Content-Based Image Retrieval in the Cloud , 2014, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS).
[18] Yunhao Liu,et al. Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks , 2015, IEEE Transactions on Mobile Computing.
[19] Xiang-Yang Li,et al. Privacy.tag: privacy concern expressed and respected , 2014, SenSys.
[20] Moni Naor,et al. Rank aggregation methods for the Web , 2001, WWW '01.
[21] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[22] Patrick Pérez,et al. Reconstructing an image from its local descriptors , 2011, CVPR 2011.
[23] I-Ling Yen,et al. An Efficient Homomorphic Encryption Protocol for Multi-User Systems , 2012, IACR Cryptol. ePrint Arch..
[24] Laurent Amsaleg,et al. A large-scale performance study of cluster-based high-dimensional indexing , 2010, VLS-MCMR '10.
[25] Jonathon S. Hare,et al. Privacy-aware image classification and search , 2012, SIGIR '12.
[26] Shaojie Tang,et al. Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation , 2013, 2013 Proceedings IEEE INFOCOM.
[27] Randy Yates,et al. Fixed-Point Arithmetic: An Introduction , 2013 .
[28] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[29] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[30] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[31] Eli Upfal,et al. Finding near neighbors through cluster pruning , 2007, PODS '07.
[32] Ramesh Govindan,et al. P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.
[33] Yunhao Liu,et al. Privacy-friendly photo capturing and sharing system , 2016, UbiComp.
[34] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).