Securing visual search queries in ubiquitous scenarios empowered by smart personal devices
暂无分享,去创建一个
Alfredo De Santis | Bruno Carpentieri | Francesco Palmieri | Xiaofei Xing | Raffaele Pizzolante | Arcangelo Castiglione
[1] Maria Gradinariu Potop-Butucaru,et al. ARMCO: Advanced topics in resource management for ubiquitous cloud computing: An adaptive approach , 2016, Future Gener. Comput. Syst..
[2] Bruno Carpentieri,et al. Copyright Protection for Images on Mobile Devices , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[3] Jemal H. Abawajy,et al. A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..
[4] Bruno Carpentieri,et al. The AVQ Algorithm: Watermarking and Compression Performances , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.
[5] Alessandro Armando,et al. Enabling BYOD through secure meta-market , 2014, WiSec '14.
[6] Alfredo De Santis,et al. On-Board Format-Independent Security of Functional Magnetic Resonance Images , 2017, ACM Trans. Embed. Comput. Syst..
[7] Qiang Zhang,et al. Enabling Cooperative Privacy-preserving Personalized search in cloud environments , 2019, Inf. Sci..
[8] Alfredo De Santis,et al. On the Protection of fMRI Images in Multi-domain Environments , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.
[9] Ling-Yu Duan,et al. Compact descriptors for mobile visual search and MPEG CDVS standardization , 2013, 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013).
[10] Giovanni Motta,et al. Handbook of Data Compression , 2009 .
[11] Jing-Ming Guo,et al. Reversible data hiding in low complexity and high quality compression scheme , 2012, Digit. Signal Process..
[12] Ciprian Dobre,et al. Data fusion technique in SPIDER Peer-to-Peer networks in smart cities for security enhancements , 2019, Inf. Sci..
[13] Alessandro Armando,et al. Securing the "Bring Your Own Device" Paradigm , 2014, Computer.
[14] Marek R. Ogiela,et al. Digital images authentication scheme based on bimodal biometric watermarking in an independent domain , 2016, J. Vis. Commun. Image Represent..
[15] Huizhong Chen,et al. The stanford mobile visual search data set , 2011, MMSys.
[16] Bernd Girod,et al. Feature Matching Performance of Compact Descriptors for Visual Search , 2014, 2014 Data Compression Conference.
[17] Ilsun You,et al. Secure and distributed video surveillance via portable devices , 2014, J. Ambient Intell. Humaniz. Comput..
[18] Guojun Wang,et al. PRMS: A Personalized Mobile Search Over Encrypted Outsourced Data , 2018, IEEE Access.
[19] Alfredo De Santis,et al. Protection of Microscopy Images through Digital Watermarking Techniques , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.
[20] Ilsun You,et al. A Secure Distributed Video Surveillance System Based on Portable Devices , 2012, CD-ARES.
[21] Florin Pop,et al. Exploiting data centres energy flexibility in smart cities: Business scenarios , 2019, Inf. Sci..
[22] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1992 .