Efficient Privacy-Preserving Similarity Range Query With Quadsector Tree in eHealthcare
暂无分享,去创建一个
Jun Shao | Hui Zhu | Rongxing Lu | Yandong Zheng | Yunguo Guan | Rongxing Lu | Jun Shao | Hui Zhu | Yandong Zheng | Yunguo Guan
[1] Debdeep Mukhopadhyay,et al. Efficient Secure k-Nearest Neighbours over Encrypted Data , 2018, EDBT.
[2] Rongxing Lu,et al. A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT , 2019, IEEE Internet of Things Journal.
[3] Petros Boufounos,et al. Privacy-preserving nearest neighbor methods: comparing signals without revealing them , 2013, IEEE Signal Processing Magazine.
[4] Tsuyoshi Takagi,et al. Secure and controllable k-NN query over encrypted cloud data with key confidentiality , 2016, J. Parallel Distributed Comput..
[5] Keke Chen,et al. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation , 2012, IEEE Transactions on Knowledge and Data Engineering.
[6] Panos Kalnis,et al. Outsourced Similarity Search on Metric Data Assets , 2012, IEEE Transactions on Knowledge and Data Engineering.
[7] Cong Wang,et al. Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records , 2015, ESORICS.
[8] Richard C. H. Connor,et al. Hilbert Exclusion , 2016, ACM Trans. Inf. Syst..
[9] Rongxing Lu,et al. Achieving Efficient and Privacy-Preserving Top-k Query Over Vertically Distributed Data Sources , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[10] Rui Li,et al. SecEQP: A Secure and Efficient Scheme for SkNN Query Problem Over Encrypted Geodata on Cloud , 2019, 2019 IEEE 35th International Conference on Data Engineering (ICDE).
[11] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[12] Osmar R. Zaïane,et al. Privacy Preserving Clustering by Data Transformation , 2010, J. Inf. Data Manag..
[13] Feifei Li,et al. Secure nearest neighbor revisited , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[14] Dongxi Liu,et al. Result Pattern Hiding Searchable Encryption for Conjunctive Queries , 2018, CCS.
[15] Rong Jin,et al. Approximate kernel k-means: solution to large scale kernel clustering , 2011, KDD.
[16] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[17] Wei Jiang,et al. Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.
[18] Rongxing Lu,et al. Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data , 2019, Journal of Medical Systems.
[19] Hong Rong,et al. Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database , 2018, IEEE Access.
[20] Cong Wang,et al. Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection , 2021, IEEE Transactions on Services Computing.
[21] Murat Kantarcioglu,et al. Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[22] Zeeshan Ahmed,et al. Artificial intelligence with multi-functional machine learning platform development for better healthcare and precision medicine , 2020, Database J. Biol. Databases Curation.
[23] Tsuyoshi Takagi,et al. Secure k-NN computation on encrypted cloud data without sharing key with query users , 2013, Cloud Computing '13.
[24] Tsuyoshi Takagi,et al. Secure k-NN query on encrypted cloud database without key-sharing , 2013, Int. J. Electron. Secur. Digit. Forensics.
[25] Jiantao Zhou,et al. Privacy-Preserving Image Denoising From External Cloud Databases , 2017, IEEE Transactions on Information Forensics and Security.